Sciweavers

2357 search results - page 271 / 472
» Computing Refactorings of Behavior Models
Sort
View
129
Voted
IJNSEC
2007
125views more  IJNSEC 2007»
15 years 3 months ago
An Observation-Centric Analysis on the Modeling of Anomaly-based Intrusion Detection
It is generally agreed that two key points always attract special concerns during the modelling of anomaly-based intrusion detection. One is the techniques about discerning two cl...
Zonghua Zhang, Hong Shen, Yingpeng Sang
118
Voted
ISSRE
2006
IEEE
15 years 9 months ago
Queuing Models for Field Defect Resolution Process
This paper explores a novel application of queuing theory to the corrective software maintenance problem to support quantitative balancing between resources and responsiveness. In...
Swapna S. Gokhale, Robert E. Mullen
151
Voted
WWW
2007
ACM
16 years 4 months ago
Information flow modeling based on diffusion rate for prediction and ranking
Information flows in a network where individuals influence each other. The diffusion rate captures how efficiently the information can diffuse among the users in the network. We p...
Xiaodan Song, Yun Chi, Koji Hino, Belle L. Tseng
KDD
2002
ACM
166views Data Mining» more  KDD 2002»
16 years 4 months ago
Exploiting response models: optimizing cross-sell and up-sell opportunities in banking
The banking industry regularly mounts campaigns to improve customer value by offering new products to existing customers. In recent years this approach has gained significant mome...
Andrew Storey, Marc-David Cohen
152
Voted
MOBIHOC
2008
ACM
16 years 3 months ago
Routing performance analysis of human-driven delay tolerant networks using the truncated levy walk model
The routing performance of delay tolerant networks (DTN) is highly correlated with the distribution of inter-contact times (ICT), the time period between two successive contacts o...
Seongik Hong, Injong Rhee, Seong Joon Kim, Kyungha...