Sciweavers

829 search results - page 152 / 166
» Adverse selection in online
Sort
View
GECCO
2009
Springer
152views Optimization» more  GECCO 2009»
15 years 7 months ago
Application of evolutionary algorithms in detection of SIP based flooding attacks
The Session Initiation Protocol (SIP) is the de facto standard for user’s session control in the next generation Voice over Internet Protocol (VoIP) networks based on the IP Mul...
M. Ali Akbar, Muddassar Farooq
RAID
2009
Springer
15 years 7 months ago
Adaptive Anomaly Detection via Self-calibration and Dynamic Updating
The deployment and use of Anomaly Detection (AD) sensors often requires the intervention of a human expert to manually calibrate and optimize their performance. Depending on the si...
Gabriela F. Cretu-Ciocarlie, Angelos Stavrou, Mich...
KCAP
2009
ACM
15 years 7 months ago
Sharing and reusing aligned ontologies with cupboard
This demo presents the Cupboard online system for sharing and reusing ontologies linked together with alignments, and that are attached to rich metadata and reviews. Categories an...
Mathieu d'Aquin, Jérôme Euzenat, Chan...
RECSYS
2009
ACM
15 years 7 months ago
Assessment of conversation co-mentions as a resource for software module recommendation
Conversation double pivots recommend target items related to a source item, based on co-mentions of source and target items in online forums. We deployed several variants on the d...
Daniel Xiaodan Zhou, Paul Resnick
MIR
2010
ACM
264views Multimedia» more  MIR 2010»
15 years 7 months ago
Quest for relevant tags using local interaction networks and visual content
Typical tag recommendation systems for photos shared on social networks such as Flickr, use visual content analysis, collaborative filtering or personalization strategies to prod...
Neela Sawant, Ritendra Datta, Jia Li, James Ze Wan...