Sciweavers

2826 search results - page 204 / 566
» A resource-based analysis of IT sourcing
Sort
View
WSDM
2009
ACM
112views Data Mining» more  WSDM 2009»
15 years 8 months ago
Finding text reuse on the web
With the overwhelming number of reports on similar events originating from different sources on the web, it is often hard, using existing web search paradigms, to find the origi...
Michael Bendersky, W. Bruce Croft
ICASSP
2008
IEEE
15 years 8 months ago
A new mutual information measure for independent component alalysis
Independent component analysis (ICA) is a popular approach for blind source separation (BSS). In this study, we develop a new mutual information measure for BSS and unsupervised l...
Jen-Tzung Chien, Hsin-Lung Hsieh, Sadaoki Furui
ASWEC
2007
IEEE
15 years 8 months ago
A Configurable Event Correlation Architecture for Adaptive J2EE Applications
Distributed applications that adapt as their environment changes are developed from selfmanaging, self-configuring and self-optimising behaviours. This requires constant monitorin...
Yan Liu, Ian Gorton, Vinh Khanh Le
COMPSAC
2007
IEEE
15 years 8 months ago
An End-to-end Detection of Wormhole Attack in Wireless Ad-hoc Networks
Wormhole attack is a severe attack in wireless ad-hoc networks. Most of the previous work eliminate the effect of wormhole attack by examining the distance or communication time o...
Xia Wang, Johnny Wong
ACSAC
2005
IEEE
15 years 7 months ago
Countering Trusting Trust through Diverse Double-Compiling
An Air Force evaluation of Multics, and Ken Thompson’s famous Turing award lecture “Reflections on Trusting Trust,” showed that compilers can be subverted to insert maliciou...
David Wheeler