Daniel Barbará

According to our database1, Daniel Barbará authored at least 121 papers between 1981 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2020
EM Fingerprints: Towards Identifying Unauthorized Hardware Substitutions in the Supply Chain Jungle.
Proceedings of the 2020 IEEE Security and Privacy Workshops, 2020

2019
Identifying Near-Native Protein Structures via Anomaly Detection.
Proceedings of the 2019 IEEE International Conference on Bioinformatics and Biomedicine, 2019

2018
On early detection of application-level resource exhaustion and starvation.
J. Syst. Softw., 2018

Storytelling with Signal Injection: Focusing Stories with Domain Knowledge.
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2018

2017
Metagenome sequence clustering with hash-based canopies.
J. Bioinform. Comput. Biol., 2017

Your data in your hands: Privacy-preserving user behavior models for context computation.
Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications Workshops, 2017

Automated Storytelling Evaluation and Story Chain Generation.
Proceedings of the 2017 IEEE International Conference on Data Mining Workshops, 2017

Detecting ROP with Statistical Learning of Program Characteristics.
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017

2016
Improving the recognition of grips and movements of the hand using myoelectric signals.
BMC Medical Informatics Decis. Mak., 2016

2015
Continuous Authentication on Mobile Devices Using Power Consumption, Touch Gestures and Physical Movement of Users.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015

Radmin: Early Detection of Application-Level Resource Exhaustion and Starvation Attacks.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015

Using myoelectric signals to recognize grips and movements of the hand.
Proceedings of the 2015 IEEE International Conference on Bioinformatics and Biomedicine, 2015

2014
Exploring representations of protein structure for automated remote homology detection and mapping of protein structure space.
BMC Bioinform., 2014

transAD: An Anomaly Detection Network Intrusion Sensor for the Web.
Proceedings of the Information Security - 17th International Conference, 2014

2013
16S rRNA metagenome clustering and diversity estimation using locality sensitive hashing.
BMC Syst. Biol., 2013

Higher-order representations of protein structure space.
Proceedings of the IEEE 3rd International Conference on Computational Advances in Bio and Medical Sciences, 2013

2012
Efficient Clustering of Metagenomic Sequences using Locality Sensitive Hashing.
Proceedings of the Twelfth SIAM International Conference on Data Mining, 2012

LSH-Div: Species diversity estimation using locality sensitive hashing.
Proceedings of the 2012 IEEE International Conference on Bioinformatics and Biomedicine, 2012

2010
Fractal Mining - Self Similarity-based Clustering and its Applications.
Proceedings of the Data Mining and Knowledge Discovery Handbook, 2nd ed., 2010

Spectrum based fraud detection in social networks.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
Topic Significance Ranking of LDA Generative Models.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2009

2008
Contrast-Set Mining of Aircraft Accidents and Incidents.
Proceedings of the Advances in Data Mining. Medical Applications, 2008

Detecting Suspicious Behavior in Surveillance Images.
Proceedings of the Workshops Proceedings of the 8th IEEE International Conference on Data Mining (ICDM 2008), 2008

On-line LDA: Adaptive Topic Models for Mining Text Streams with Applications to Topic Detection and Tracking.
Proceedings of the 8th IEEE International Conference on Data Mining (ICDM 2008), 2008

2006
Detecting outliers using transduction and statistical testing.
Proceedings of the Twelfth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2006

2005
Categorization and Keyword Identification of Unlabeled Documents.
Proceedings of the 5th IEEE International Conference on Data Mining (ICDM 2005), 2005

Fractal Mining - Self Similarity-based Clustering and its Applications.
Proceedings of the Data Mining and Knowledge Discovery Handbook., 2005

2004
Classifying Documents Without Labels.
Proceedings of the Fourth SIAM International Conference on Data Mining, 2004

Self-Similar Mining of Time Association Rules.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2004

2003
An Approximate Median Polish Algorithm for Large Multidimensional Data Sets.
Knowl. Inf. Syst., 2003

A Checksum-based Corruption Detection Technique.
J. Comput. Secur., 2003

Using Self-Similarity to Cluster Large Data Sets.
Data Min. Knowl. Discov., 2003

Bootstrapping a Data Mining Intrusion Detection System.
Proceedings of the 2003 ACM Symposium on Applied Computing (SAC), 2003

Screening and interpreting multi-item associations based on log-linear modeling.
Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, August 24, 2003

Mining Relevant Text from Unlabelled Documents.
Proceedings of the 3rd IEEE International Conference on Data Mining (ICDM 2003), 2003

Compressing High Dimensional Datasets by Fractals.
Proceedings of the 2003 Data Compression Conference (DCC 2003), 2003

2002
Learning missing values from summary constraints.
SIGKDD Explor., 2002

Requirements for Clustering Data Streams.
SIGKDD Explor., 2002

Characterizing E-business Workloads Using Fractal Methods.
J. Web Eng., 2002

Data Mining Methods for Large Databases.
Proceedings of the XVII Simpósio Brasileiro de Banco de Dados, 2002

Mining Data Streams: Applications and Methods.
Proceedings of the XVII Simpósio Brasileiro de Banco de Dados, 2002

Mining Malicious Corruption of Data with Hidden Markov Models.
Proceedings of the Research Directions in Data and Applications Security, 2002

Modeling and Imputation of Large Incomplete Multidimensional Datasets.
Proceedings of the Data Warehousing and Knowledge Discovery, 4th International Conference, 2002

COOLCAT: an entropy-based algorithm for categorical clustering.
Proceedings of the 2002 ACM CIKM International Conference on Information and Knowledge Management, 2002

An Architecture for Anomaly Detection.
Proceedings of the Applications of Data Mining in Computer Security, 2002

2001
ADAM: A Testbed for Exploring the Use of Data Mining in Intrusion Detection.
SIGMOD Rec., 2001

Special Issue on Data Mining for Intrusion Detection and Threat Analysis - Guest Editor's Introduction.
SIGMOD Rec., 2001

Loglinear-Based Quasi Cubes.
J. Intell. Inf. Syst., 2001

Finding Dense Clusters in Hyperspace: An Approach Based on Row Shuffling.
Proceedings of the Advances in Web-Age Information Management, 2001

Preserving QoS of e-commerce sites through self-tuning: a performance model approach.
Proceedings of the Proceedings 3rd ACM Conference on Electronic Commerce (EC-2001), 2001

Detecting Novel Network Intrusions Using Bayes Estimators.
Proceedings of the First SIAM International Conference on Data Mining, 2001

Tracking Clusters in Evolving Data Sets.
Proceedings of the Fourteenth International Florida Artificial Intelligence Research Society Conference, 2001

2000
Using Loglinear Models to Compress Datacube.
Proceedings of the Web-Age Information Management, First International Conference, 2000

Mining Cinematic Knowledge Work in Progress [An Extended Abstract].
Proceedings of the International Workshop on Multimedia Data Mining, 2000

Using the fractal dimension to cluster datasets.
Proceedings of the sixth ACM SIGKDD international conference on Knowledge discovery and data mining, 2000

Using Checksums to Detect Data Corruption.
Proceedings of the Advances in Database Technology, 2000

Protecting File systems Against Corruption Using Checksums.
Proceedings of the Data and Application Security, 2000

Supporting Online Queries in ROLAP.
Proceedings of the Data Warehousing and Knowledge Discovery, 2000

1999
Mobile Computing and Databases - A Survey.
IEEE Trans. Knowl. Data Eng., 1999

Supporting Electronic Ink Databases.
Inf. Syst., 1999

The Characterization of Continuous Queries.
Int. J. Cooperative Inf. Syst., 1999

The Role of Approximations in Maintaining and Using Aggregate Views.
IEEE Data Eng. Bull., 1999

Using Approximations to Scale Exploratory Data Analysis in Datacubes.
Proceedings of the Fifth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 1999

Chaotic Mining: Knowledge Discovery Using the Fractal Dimension.
Proceedings of the 1999 ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery, 1999

1997
Information Systems Research at George Mason University.
SIGMOD Rec., 1997

Quasi-Cubes: Exploiting Approximations in Multidimensional Databases.
SIGMOD Rec., 1997

The New Jersey Data Reduction Report.
IEEE Data Eng. Bull., 1997

Letter from the Special Issue Editor.
IEEE Data Eng. Bull., 1997

Certification Reports: Supporting Transactions in Wireless Systems.
Proceedings of the 17th International Conference on Distributed Computing Systems, 1997

The AudioWeb.
Proceedings of the Sixth International Conference on Information and Knowledge Management (CIKM'97), 1997

1996
Guest Editors' Introduction.
Distributed Parallel Databases, 1996

Retrieving Electronic Ink by Content.
Proceedings of the International Workshop on Multi-Media Database Management Systems, 1996

Electronic Catalogs - Panel.
Proceedings of the Twelfth International Conference on Data Engineering, February 26, 1996

The Gold Text Indexing Engine.
Proceedings of the Twelfth International Conference on Data Engineering, February 26, 1996

Ink as a First-Class Datatype in Multimedia Databases.
Proceedings of the Multimedia Database System: Issues and Research Direction, 1996

1995
Sleepers and Workaholics: Caching Strategies in Mobile Environments
VLDB J., 1995

The Handwritten Trie: Indexing Electronic Ink.
Proceedings of the 1995 ACM SIGMOD International Conference on Management of Data, 1995

Efficient Processing of Proximity Queries for Large Databases.
Proceedings of the Eleventh International Conference on Data Engineering, 1995

1994
The Demarcation Protocol: A Technique for Maintaining Constraints in Distributed Database Systems
VLDB J., 1994

Aggressive Transmissions of Short Messages Over Redundant Paths.
IEEE Trans. Parallel Distributed Syst., 1994

The Impact of Database Research on Industrial Products (Panel Summary).
SIGMOD Rec., 1994

Replicated Data Management in Mobile Environments: Anything New Under the Sun?
Proceedings of the Applications in Parallel and Distributed Computing, 1994

1993
Extending the Scope of Database Services.
SIGMOD Rec., 1993

Interoperability with Unstructured Data and Services.
Proceedings of the RIDE-IMS '93, 1993

The Gold Mailer.
Proceedings of the Ninth International Conference on Data Engineering, 1993

Information Brokers: Sharing Knowledge in a Heterogeneous Distributed System.
Proceedings of the Database and Expert Systems Applications, 4th International Conference, 1993

1992
The Management of Probabilistic Data.
IEEE Trans. Knowl. Data Eng., 1992

Probabilistic Dignosis of Hot Spots.
Proceedings of the Eighth International Conference on Data Engineering, 1992

The Demarcation Protocol: A Technique for Maintaining Linear Arithmetic Constraints in Distributed Database Systems.
Proceedings of the Advances in Database Technology, 1992

1991
A Class of Randomized Strategies for Low-Cost Comparison of File Copies.
IEEE Trans. Parallel Distributed Syst., 1991

Data Sharing in a Large Heterogeneous Environment.
Proceedings of the Seventh International Conference on Data Engineering, 1991

Aggressive transmissions over redundant paths.
Proceedings of the 10th International Conference on Distributed Computing Systems (ICDCS 1991), 1991

1990
Data Caching Issues in an Information Retrieval System.
ACM Trans. Database Syst., 1990

The Case for Controlled Inconsistency in Replicated Data.
Proceedings of the First Workshop on the Management of Replicated Data, 1990

Using Stashing to Increase Node Autonomy in Distributed File Systems.
Proceedings of the Ninth Symposium on Reliable Distributed Systems, 1990

Stashing as a fault-tolerant mechanism for distributed systems.
Proceedings of the 4th ACM SIGOPS European Workshop, Bologna, Italy, September 3-5, 1990, 1990

Polynets: providing reliable communications for distributed systems.
Proceedings of the 4th ACM SIGOPS European Workshop, Bologna, Italy, September 3-5, 1990, 1990

A Probalilistic Relational Data Model.
Proceedings of the Advances in Database Technology, 1990

1989
Increasing Availability Under Mutual Exclusion Constraints with Dynamic Vote Reassignment.
ACM Trans. Comput. Syst., 1989

Negotiating Data Access in Federated Database Systems.
Proceedings of the Fifth International Conference on Data Engineering, 1989

A Randomized Technique for Remote File Comparison.
Proceedings of the 9th International Conference on Distributed Computing Systems, 1989

A file storage implementation for very large distributed systems.
Proceedings of the Second Workshop On Workstation Operating Systems, 1989

The Complexity of Collapsing Reachability Graphs.
Proceedings of the Automatic Verification Methods for Finite State Systems, 1989

1988
A Software Environment for the Specification and Analysis of Problems of Coordination and Concurrency.
IEEE Trans. Software Eng., 1988

Exploiting Symmetries for Low-Cost Comparison of File Copies.
Proceedings of the 8th International Conference on Distributed Computing Systems, 1988

Quasi-Copies: Efficient Data Sharing for Information Retrieval Systems.
Proceedings of the Advances in Database Technology, 1988

1987
SPANNER: A Tool for the Specification, Analysis, and Evaluation of Protocols.
IEEE Trans. Software Eng., 1987

The Reliability of Voting Mechanisms.
IEEE Trans. Computers, 1987

Maintaining Availability of Replicated Data in a Dynamic Failure Environment.
Proceedings of the Sixth Symposium on Reliability in Distributed Software and Database Systems, 1987

LAN Broadcast Protocols for Implementing the CCA Model.
Proceedings of the Protocol Specification, 1987

1986
The Vulnerabilty of Vote Assignments.
ACM Trans. Comput. Syst., 1986

Mutual Exclusion in Partitioned Distributed Systems.
Distributed Comput., 1986

Protocols for Dynamic Vote Reassignment.
Proceedings of the Fifth Annual ACM Symposium on Principles of Distributed Computing, 1986

Policies for Dynamic Vote Reassignment.
Proceedings of the 6th International Conference on Distributed Computing Systems, 1986

Specifying and Analyzing Protocols with SPANNER.
Proceedings of the IEEE International Conference on Communications: Integrating the World Through Communications, 1986

1985
How to Assign Votes in a Distributed System
J. ACM, October, 1985

Distributed Computing Research at Princeton.
IEEE Database Eng. Bull., 1985

1984
The Vulnerability of Voting Mechanisms.
Proceedings of the Fourth Symposium on Reliability in Distributed Software and Database Systems, 1984

Optimizing the Reliability Provided by Voting Mechanisms.
Proceedings of the 4th International Conference on Distributed Computing Systems, 1984

1982
How Expensive is Data Replication? An Example.
Proceedings of the Proceedings of the 3rd International Conference on Distributed Computing Systems, 1982

1981
The cost of data replication.
Proceedings of the SIGCOMM '81, 1981


  Loading...