Sciweavers

1422 search results - page 94 / 285
» A Framework for Understanding Botnets
Sort
View
CAISE
2009
Springer
15 years 10 months ago
Evaluation Patterns for Analyzing the Costs of Enterprise Information Systems
Introducing enterprise information systems (EIS) is usually associated with high costs. It is therefore crucial to understand those factors that determine or influence these costs...
Bela Mutschler, Manfred Reichert
CCS
2007
ACM
15 years 10 months ago
Toward measuring network security using attack graphs
In measuring the overall security of a network, a crucial issue is to correctly compose the measure of individual components. Incorrect compositions may lead to misleading results...
Lingyu Wang, Anoop Singhal, Sushil Jajodia
ASWEC
2000
IEEE
15 years 8 months ago
ReVis: Reverse Engineering by Clustering and Visual Object Classification
This paper presents the framework of a scale-oriented scheme for the presentation and classification of reverse engineered sections of procedural code into objects. The aim is to ...
Aaron J. Quigley, Margot Postema, Heinz W. Schmidt
116
Voted
ECIS
2004
15 years 5 months ago
Mobile telecommunications market innovation: the transformation from 2g to 3g
Current research focuses on the dynamics of mobile telecommunications market innovation from the perspectives of technology innovation or service adoption. However,because there i...
Jan Damsgaard, Ping Gao
ICML
2003
IEEE
16 years 4 months ago
The Use of the Ambiguity Decomposition in Neural Network Ensemble Learning Methods
We analyze the formal grounding behind Negative Correlation (NC) Learning, an ensemble learning technique developed in the evolutionary computation literature. We show that by rem...
Gavin Brown, Jeremy L. Wyatt