Sciweavers

9071 search results - page 1683 / 1815
» A co-design modeling approach for computer network systems
Sort
View
COMPSEC
2002
185views more  COMPSEC 2002»
14 years 9 months ago
A framework for understanding and predicting insider attacks
In this paper an insider attack is considered to be deliberate misuse by those who are authorized to use computers and networks. Applying this definition in real-life settings to ...
E. Eugene Schultz
WSDM
2010
ACM
172views Data Mining» more  WSDM 2010»
15 years 7 months ago
Early Online Identification of Attention Gathering Items In Social Media
Activity in social media such as blogs, micro-blogs, social networks, etc is manifested via interaction that involves text, images, links and other information items. Naturally, s...
Michael Mathioudakis, Nick Koudas, Peter Marbach
AI
2010
Springer
14 years 10 months ago
Interactive semantics
instruments. A melody expresses abstract artistic conception or emotion. The explanation ability plays the key role in the externalization and internalization from one form of expr...
Hai Zhuge
ICDCS
2012
IEEE
13 years 11 days ago
eTransform: Transforming Enterprise Data Centers by Automated Consolidation
Abstract—Modern day enterprises have a large IT infrastructure comprising thousands of applications running on servers housed in tens of data centers geographically spread out. T...
Rahul Singh, Prashant J. Shenoy, K. K. Ramakrishna...
CVPR
2009
IEEE
16 years 5 months ago
Vocabulary Hierarchy Optimization for Effective and Transferable Retrieval
Scalable image retrieval systems usually involve hierarchical quantization of local image descriptors, which produces a visual vocabulary for inverted indexing of images. Although ...
Rongrong Ji (Harbin Institute of Technology), Xing...
« Prev « First page 1683 / 1815 Last » Next »