Sciweavers

10577 search results - page 2008 / 2116
» Active Data Mining
Sort
View
CCS
2007
ACM
15 years 2 months ago
Highly efficient techniques for network forensics
Given a history of packet transmissions and an excerpt of a possible packet payload, the payload attribution problem requires the identification of sources, destinations and the t...
Miroslav Ponec, Paul Giura, Hervé Brön...
DRM
2006
Springer
15 years 1 months ago
Securing sensitive content in a view-only file system
One of the most fundamental problems in computer security is protecting sensitive digital information from unauthorized disclosure. There are a number of challenges, such as spywa...
Kevin Borders, Xin Zhao, Atul Prakash
ISMDA
2000
Springer
15 years 1 months ago
A System for Monitoring Nosocomial Infections
In this work, we describe a project, jointly started by DEIS University of Bologna and Dianoema S.p.A., in order to build a system which is able to monitor nosocomial infections. T...
Evelina Lamma, M. Manservigi, Paola Mello, Sergio ...
CIKM
2008
Springer
14 years 12 months ago
Dr. Searcher and Mr. Browser: a unified hyperlink-click graph
We introduce a unified graph representation of the Web, which includes both structural and usage information. We model this graph using a simple union of the Web's hyperlink ...
Barbara Poblete, Carlos Castillo, Aristides Gionis
EMSOFT
2008
Springer
14 years 11 months ago
Workload-based configuration of MEMS-based storage devices for mobile systems
Because of its small form factor, high capacity, and expected low cost, MEMS-based storage is a suitable storage technology for mobile systems. However, flash memory may outperfor...
Mohammed G. Khatib, Ethan L. Miller, Pieter H. Har...
« Prev « First page 2008 / 2116 Last » Next »