Sciweavers

3866 search results - page 677 / 774
» Classification of Ordinal Data
Sort
View
CHI
2007
ACM
15 years 8 months ago
Command line or pretty lines?: comparing textual and visual interfaces for intrusion detection
Intrusion detection (ID) is one of network security engineers' most important tasks. Textual (command-line) and visual interfaces are two common modalities used to support en...
Ramona Su Thompson, Esa M. Rantanen, William Yurci...
CHI
2007
ACM
15 years 8 months ago
A familiar face(book): profile elements as signals in an online social network
Using data from a popular online social network site, this paper explores the relationship between profile structure (namely, which fields are completed) and number of friends, gi...
Cliff Lampe, Nicole Ellison, Charles Steinfield
CHI
2007
ACM
15 years 8 months ago
An exploration of web-based monitoring: implications for design
Monitoring occurs when users return to previously viewed web pages to view new or updated information. While tools exist to support web-based monitoring, we know little about the ...
Melanie Kellar, Carolyn R. Watters, Kori M. Inkpen
CONEXT
2007
ACM
15 years 8 months ago
Identifying dynamic IP address blocks serendipitously through background scanning traffic
Today's Internet contains a large portion of "dynamic" IP addresses, which are assigned to clients upon request. A significant amount of malicious activities have b...
Yu Jin, Esam Sharafuddin, Zhi-Li Zhang
DEBS
2007
ACM
15 years 8 months ago
A QoS policy configuration modeling language for publish/subscribe middleware platforms
Publish/subscribe (pub/sub) middleware platforms for eventbased distributed systems often provide many configurable policies that affect end-to-end quality of service (QoS). Altho...
Joe Hoffert, Douglas C. Schmidt, Aniruddha S. Gokh...