Persuasive prediction of concurrency access anomalies.
Jeff HuangCharles ZhangPublished in: ISSTA (2011)
Keyphrases
- prediction accuracy
- dynamic allocation
- access control
- anomaly detection
- database systems
- prediction algorithm
- anomalous behavior
- prediction model
- databases
- database
- information access
- prediction error
- concurrency control
- remote access
- multiple users
- transaction processing
- fine grained
- decision trees
- data mining
- data sets