Sciweavers

1303 search results - page 240 / 261
» Ambient Information Systems: Evaluation in Two Paradigms
Sort
View
124
Voted
ESORICS
2004
Springer
15 years 7 months ago
Discovering Novel Attack Strategies from INFOSEC Alerts
Abstract. Correlating security alerts and discovering attack strategies are important and challenging tasks for security analysts. Recently, there have been several proposed techni...
Xinzhou Qin, Wenke Lee
CIKM
2007
Springer
15 years 8 months ago
Optimal proactive caching in peer-to-peer network: analysis and application
As a promising new technology with the unique properties like high efficiency, scalability and fault tolerance, Peer-toPeer (P2P) technology is used as the underlying network to b...
Weixiong Rao, Lei Chen 0002, Ada Wai-Chee Fu, Ying...
WWW
2009
ACM
16 years 2 months ago
Collaborative filtering for orkut communities: discovery of user latent behavior
Users of social networking services can connect with each other by forming communities for online interaction. Yet as the number of communities hosted by such websites grows over ...
WenYen Chen, Jon-Chyuan Chu, Junyi Luan, Hongjie B...
130
Voted
SIGSOFT
2009
ACM
16 years 2 months ago
Automatic steering of behavioral model inference
Many testing and analysis techniques use finite state models to validate and verify the quality of software systems. Since the specification of such models is complex and timecons...
David Lo, Leonardo Mariani, Mauro Pezzè
GIS
1998
ACM
15 years 1 months ago
Mean-Variance Analysis of the Performance of Spatial Ordering Methods
Geographical Information Systems (GIS) involve the manipulation of large spatial data sets, and the performance of these systems is often determined by how these data sets are orga...
Akhil Kumar, Waleed A. Muhanna, Raymond A. Patters...