Sciweavers

1274 search results - page 217 / 255
» Combined Data Mining Approach for Intrusion Detection
Sort
View
SIGCOMM
2010
ACM
14 years 10 months ago
California fault lines: understanding the causes and impact of network failures
Of the major factors affecting end-to-end service availability, network component failure is perhaps the least well understood. How often do failures occur, how long do they last,...
Daniel Turner, Kirill Levchenko, Alex C. Snoeren, ...
EDOC
2011
IEEE
13 years 9 months ago
UML Metamodel-based Workflow Modeling and Execution
—In this paper, we present a UML metamodel-based approach for creating and executing workflow models. The modeling language is introduced through its abstract syntax, and an eval...
Jens Brüning, Martin Gogolla
ICDE
2008
IEEE
126views Database» more  ICDE 2008»
15 years 4 months ago
Monitoring the evolution of interests in the blogosphere
— We describe blogTrust, an innovative modular and extensible prototype application for monitoring changes in the interests of blogosphere participants. We also propose a new app...
Iraklis Varlamis, Vasilis Vassalos, Antonis Palaio...
ENTER
2008
Springer
14 years 11 months ago
Evaluating Recommender Systems in Tourism - A Case Study from Austria
Recommender systems (RS) are employed to personalize user interaction with (e.g. tourism) web-sites, supporting both navigation through large service assortments and the configura...
Markus Zanker, Matthias Fuchs, Wolfram Höpken...
IDA
2007
Springer
14 years 9 months ago
Inference of node replacement graph grammars
Graph grammars combine the relational aspect of graphs with the iterative and recursive aspects of string grammars, and thus represent an important next step in our ability to dis...
Jacek P. Kukluk, Lawrence B. Holder, Diane J. Cook