Author image not provided
 Ningning Wu

Authors:
Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article5.50
Citation Count99
Publication count18
Publication years2001-2009
Available for download8
Average downloads per article542.50
Downloads (cumulative)4,340
Downloads (12 Months)112
Downloads (6 Weeks)10
SEARCH
ROLE
Arrow RightAuthor only
· Advisor only
· All roles


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


18 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 18 of 18
Sort by:

1 published by ACM
March 2009 ACM Transactions on Algorithms (TALG): Volume 5 Issue 2, March 2009
Publisher: ACM
Bibliometrics:
Citation Count: 4
Downloads (6 Weeks): 1,   Downloads (12 Months): 13,   Downloads (Overall): 416

Full text available: PDFPDF
Pipelined filter ordering is a central problem in database query optimization. The problem is to determine the optimal order in which to apply a given set of commutative filters (predicates) to a set of elements (the tuples of a relation), so as to find, as efficiently as possible, the tuples ...
Keywords: Pipelined filter ordering, query optimization, flow algorithms, selection ordering

2
February 2009 AIKED'09: Proceedings of the 8th WSEAS international conference on Artificial intelligence, knowledge engineering and data bases
Publisher: World Scientific and Engineering Academy and Society (WSEAS)
Bibliometrics:
Citation Count: 0

Urban land use change is a complex and dynamic process. It is important to understand the complexity and dynamics in the change process of urban land (and choose correct data models) by analyzing the driving forces and its associated dynamics, in order to predict changes in the speed, intensity or ...
Keywords: artificial intelligence, complexity, urban and land dynamics, bifurcations and phase-transitions

3
July 2008 AIMS '08: Proceedings of the 2nd international conference on Autonomous Infrastructure, Management and Security: Resilient Networks and Services
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 0

The transition planning problem is to move a system from an existing starting configuration to a desired final configuration at the lowest possible cost. Prior work shows that the transition planning problem can be reduced to a bipartite matching problem and the stable marriage algorithm can be used to approximate ...

4
April 2008 ITNG '08: Proceedings of the Fifth International Conference on Information Technology: New Generations
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 2

This paper presents a parsing method for the entity extraction from open source documents. A web page of interest is first downloaded to a text file. The method then applies a set of patterns to the text file to extract interesting entity fragments. The patterns are currently particularly designed for ...
Keywords: Data mining, Information extraction, Parsing, Pattern match, and Text mining

5
April 2008 Journal of Computing Sciences in Colleges: Volume 23 Issue 4, April 2008
Publisher: Consortium for Computing Sciences in Colleges
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 0,   Downloads (12 Months): 4,   Downloads (Overall): 553

Full text available: PDFPDF
Historical research of intrusion, anomaly, or rogue software detection, and network protection techniques to prevent Denial of Service, or other malicious software attacks, have involved antiquated singularly scoped techniques. Malicious software attacks, whether in the form of worms, spyware, malware, or computer viruses, have economically and productively impacted the state ...

6
January 2008
Bibliometrics:
Citation Count: 0

The transition planning problem for system configuration management is to determine, given a current system state and a set of new requirements, how to best satisfy those requirements. In this thesis, we draw upon several approaches to solving this problem, including the theory of closures in configuration management, and graph ...

7
May 2007 Journal of Computing Sciences in Colleges: Volume 22 Issue 5, May 2007
Publisher: Consortium for Computing Sciences in Colleges
Bibliometrics:
Citation Count: 2
Downloads (6 Weeks): 0,   Downloads (12 Months): 4,   Downloads (Overall): 237

Full text available: PDFPDF
The paper introduces an on-going research project of entity identification in open (publicly available) source documents where part of the identifying attributes have been redacted. The project proof-of-concept focuses on published obituary notices as the target source, and the decedent and other individuals listed in the notice as the identities ...

8
December 2006 LISA '06: Proceedings of the 20th conference on Large Installation System Administration
Publisher: USENIX Association
Bibliometrics:
Citation Count: 4

Most autonomic systems require large amounts of human labor and configuration before they become autonomous. We study the management problem for autonomic systems, and consider the actions needed before a system becomes self-managing, as well as the tasks a system administrator must still perform to keep so-called "self-managing systems" operating ...

9
October 2006 Decision Support Systems: Volume 42 Issue 1, October 2006
Publisher: Elsevier Science Publishers B. V.
Bibliometrics:
Citation Count: 9

This paper presents a novel anomaly detection and clustering algorithm for the network intrusion detection based on factor analysis and Mahalanobis distance. Factor analysis is used to uncover the latent structure of a set of variables. The Mahalanobis distance is used to determine the "similarity" of a set of values ...
Keywords: anomaly detection, factor analysis, intrusion detection

10 published by ACM
June 2006 PODS '06: Proceedings of the twenty-fifth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Publisher: ACM
Bibliometrics:
Citation Count: 10
Downloads (6 Weeks): 1,   Downloads (12 Months): 24,   Downloads (Overall): 266

Full text available: PDFPDF
Pipelined filter ordering is a central problem in database query optimization, and has received renewed attention recently in the context of environments such as the web, continuous high-speed data streams and sensor networks. We present algorithms for two natural extensions of the classical pipelined filter ordering problem: (1) a distributional ...
Keywords: pipelined filter ordering, flow algorithms, selection ordering, query optimization

11
May 2006 Journal of Computing Sciences in Colleges: Volume 21 Issue 5, May 2006
Publisher: Consortium for Computing Sciences in Colleges
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 1,   Downloads (12 Months): 3,   Downloads (Overall): 180

Full text available: PDFPDF
This paper describes a proposed master's degree program in the new field of Information Quality, the reasons behind it, and how academe and industry have collaborated to create it.

12
May 2006 Journal of Computing Sciences in Colleges: Volume 21 Issue 5, May 2006
Publisher: Consortium for Computing Sciences in Colleges
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 0,   Downloads (12 Months): 1,   Downloads (Overall): 142

Full text available: PDFPDF
An innovative application of Decision Tree and Association Rules has been presented. When conventional statistical techniques (e.g. t-test, simple regression, multiple regression, discriminant analysis etc.) concluded that high school grade point average and standard test scores are the indicators of a typical college student's academic performance, then the above two ...

13
December 2005 LISA '05: Proceedings of the 19th conference on Large Installation System Administration Conference - Volume 19
Publisher: USENIX Association
Bibliometrics:
Citation Count: 4

The core of system administration is to utilize a set of "best practices" that minimize cost and result in maximum value, but very little is known about the true cost of system administration. In this paper, we define the problem of determining the cost of system administration. For support organizations ...

14
March 2005 ECIR'05: Proceedings of the 27th European conference on Advances in Information Retrieval Research
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 13

Compression-based text classification methods are easy to apply, requiring virtually no preprocessing of the data. Most such methods are character-based, and thus have the potential to automatically capture non-word features of a document, such as punctuation, word-stems, and features spanning more than one word. However, compression-based classification methods have drawbacks ...

15 published by ACM
March 2005 ACM-SE 43: Proceedings of the 43rd annual Southeast regional conference - Volume 1
Publisher: ACM
Bibliometrics:
Citation Count: 2
Downloads (6 Weeks): 4,   Downloads (12 Months): 12,   Downloads (Overall): 323

Full text available: PDFPDF
In this paper, we propose an algorithm to partition both the search space and the database for the parallel mining of frequent closed itemsets in large databases. The partitioning of the search space is based on splitting the power set lattice of the total item set to two sub-lattices. Conditional ...
Keywords: association rule, parallel algorithm, conditional database, parallel data mining, partitioning, frequent closed itemset

16
July 2002 Journal of Computer Security: Volume 10 Issue 1-2, 2002
Publisher: IOS Press
Bibliometrics:
Citation Count: 8

Recently, association rules have been used to generate profiles of "normal" behavior for anomaly detection. However, the time factor (especially in terms of multiple time granularities) has not been utilized extensively in generation of these profiles. In reality, user behavior during different time intervals may be very different. For example, ...

17 published by ACM
December 2001 ACM SIGMOD Record: Volume 30 Issue 4, December 2001
Publisher: ACM
Bibliometrics:
Citation Count: 39
Downloads (6 Weeks): 4,   Downloads (12 Months): 53,   Downloads (Overall): 2,223

Full text available: PDFPDF
Intrusion detection systems have traditionally been based on the characterization of an attack and the tracking of the activity on the system to see if it matches that characterization. Recently, new intrusion detection systems based on data mining are making their appearance in the field. This paper describes the design ...
Keywords: intrusion detection software, pattern analysis, cyber attacks, data mining

18
January 2001
Bibliometrics:
Citation Count: 0

The need for intrusion detection systems that are able to monitor large amounts of audit trail data, detect intrusions quickly, and generate few false alarms is pressing. This work introduces a network anomaly detection system, Audit Data Analysis and Mining (ADAM), which uses a novel application of association rules and ...



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us