Sciweavers

274 search results - page 53 / 55
» Identifying sets of key players in a social network
Sort
View
IMC
2006
ACM
13 years 11 months ago
Measurement based analysis, modeling, and synthesis of the internet delay space
Understanding the characteristics of the Internet delay space (i.e., the all-pairs set of static round-trip propagation delays among edge networks in the Internet) is important fo...
Bo Zhang, T. S. Eugene Ng, Animesh Nandi, Rudolf H...
FC
1998
Springer
96views Cryptology» more  FC 1998»
13 years 10 months ago
Compliance Checking in the PolicyMaker Trust Management System
Emerging electronic commerce services that use public-key cryptography on a mass-market scale require sophisticated mechanisms for managing trust. For example, any service that rec...
Matt Blaze, Joan Feigenbaum, Martin Strauss
HICSS
2003
IEEE
114views Biometrics» more  HICSS 2003»
13 years 11 months ago
Information in Health Care Process - Evaluation Toolkit Development
Increasing health care costs put a great strain on national economies. In recent years there have been several national and regional research and development projects in Finland a...
Heidi Häkkinen, Pekka Turunen, Ton A. M. Spil
IS
2010
13 years 4 months ago
Tree pattern mining with tree automata constraints
Most work on pattern mining focuses on simple data structures such as itemsets and sequences of itemsets. However, a lot of recent applications dealing with complex data like chem...
Sandra de Amo, Nyara A. Silva, Ronaldo P. Silva, F...
RAID
2009
Springer
14 years 8 days ago
PE-Miner: Mining Structural Information to Detect Malicious Executables in Realtime
In this paper, we present an accurate and realtime PE-Miner framework that automatically extracts distinguishing features from portable executables (PE) to detect zero-day (i.e. pr...
M. Zubair Shafiq, S. Momina Tabish, Fauzan Mirza, ...