Sciweavers

379 search results - page 62 / 76
» A Generative Approach to Change-Driven Consistency in Multi-...
Sort
View
NPAR
2010
ACM
15 years 3 months ago
Compact explosion diagrams
This paper presents a system to automatically generate compact explosion diagrams. Inspired by handmade illustrations, our approach reduces the complexity of an explosion diagram ...
Markus Tatzgern, Denis Kalkofen, Dieter Schmalstie...
HICSS
2009
IEEE
209views Biometrics» more  HICSS 2009»
15 years 5 months ago
SIDD: A Framework for Detecting Sensitive Data Exfiltration by an Insider Attack
Detecting and mitigating insider threat is a critical element in the overall information protection strategy. By successfully implementing tactics to detect this threat, organizat...
Yali Liu, Cherita L. Corbett, Ken Chiang, Rennie A...
MOBICOM
2004
ACM
15 years 3 months ago
Detecting and correcting malicious data in VANETs
In order to meet performance goals, it is widely agreed that vehicular ad hoc networks (VANETs) must rely heavily on node-to-node communication, thus allowing for malicious data t...
Philippe Golle, Daniel H. Greene, Jessica Staddon
WWW
2008
ACM
15 years 11 months ago
Exploring social annotations for information retrieval
Social annotation has gained increasing popularity in many Web-based applications, leading to an emerging research area in text analysis and information retrieval. This paper is c...
Ding Zhou, Jiang Bian, Shuyi Zheng, Hongyuan Zha, ...
ICDM
2003
IEEE
100views Data Mining» more  ICDM 2003»
15 years 3 months ago
Tractable Group Detection on Large Link Data Sets
Discovering underlying structure from co-occurrence data is an important task in a variety of fields, including: insurance, intelligence, criminal investigation, epidemiology, hu...
Jeremy Kubica, Andrew W. Moore, Jeff G. Schneider