Sciweavers

2071 search results - page 169 / 415
» An Empirical Evaluation of LFG-DOP
Sort
View
HICSS
2008
IEEE
222views Biometrics» more  HICSS 2008»
15 years 8 months ago
A Comprehensive Fuzzy Logic Model for Feature Performance Assessment against Network Attacks
—The feature selection phase is one of the first, and yet very important, tasks to be completed during the development of any Intrusion Detection System. If this phase is neglec...
Iosif-Viorel Onut, Ali A. Ghorbani
HICSS
2008
IEEE
165views Biometrics» more  HICSS 2008»
15 years 8 months ago
CRM and Customer Portfolio Management for E-Tailers
“Don’t put all your eggs in one basket” is common wisdom with respect to financial portfolio theory. The configuration of customer portfolios with regard to appropriate risk...
Dennis Kundisch, Stefan Sackmann, Markus Ruch
HICSS
2008
IEEE
129views Biometrics» more  HICSS 2008»
15 years 8 months ago
Understanding Development and Usage of Social Networking Sites: The Social Software Performance Model
Social networking sites such as MySpace and Facebook thrive on energetic social interaction, but the factors that assure this are not well understood. There is a lack of theory th...
Catherine Dwyer, Starr Roxanne Hiltz, George Widme...
ICC
2008
IEEE
108views Communications» more  ICC 2008»
15 years 7 months ago
Delay-Differentiated Gossiping in Delay Tolerant Networks
— Delay Tolerant Networks are increasingly being envisioned for a wide range of applications. Many of these applications need support for quality of service (QoS) differentiation...
Parameswaran Ramanathan, Aarti Singh
ICDM
2008
IEEE
117views Data Mining» more  ICDM 2008»
15 years 7 months ago
RTM: Laws and a Recursive Generator for Weighted Time-Evolving Graphs
How do real, weighted graphs change over time? What patterns, if any, do they obey? Earlier studies focus on unweighted graphs, and, with few exceptions, they focus on static snap...
Leman Akoglu, Mary McGlohon, Christos Faloutsos