Sciweavers

8278 search results - page 1424 / 1656
» Context-Aware Process Networks
Sort
View
SSDBM
2008
IEEE
150views Database» more  SSDBM 2008»
15 years 10 months ago
Summarizing Two-Dimensional Data with Skyline-Based Statistical Descriptors
Much real data consists of more than one dimension, such as financial transactions (eg, price × volume) and IP network flows (eg, duration × numBytes), and capture relationship...
Graham Cormode, Flip Korn, S. Muthukrishnan, Dives...
VTC
2008
IEEE
120views Communications» more  VTC 2008»
15 years 10 months ago
Low Backhaul Distributed Detection Strategies for an Interference Limited Uplink Cellular System
— This paper deals with multiuser detection through base station cooperation in uplink interference limited scenarios. At high frequency reuse, each base station not only receive...
Shahid Khattak, Gerhard Fettweis
AH
2008
Springer
15 years 10 months ago
A Scrutable User Modelling Infrastructure for Enabling Life-Long User Modelling
User Modelling is the core component for the majority of personalisation systems. By keeping a model for every user, a system can successfully personalise its content and utilise a...
Demetris Kyriacou
AI
2008
Springer
15 years 10 months ago
A Belief-Theoretic Reputation Estimation Model for Multi-context Communities
Online communities have grown to be an alternative form of communication for many people. This widespread growth and influence of the members of these communities in shaping the d...
Ebrahim Bagheri, M. Barouni-Ebrahimi, Reza Zafaran...
ACSAC
2007
IEEE
15 years 10 months ago
Spector: Automatically Analyzing Shell Code
Detecting the presence of buffer overflow attacks in network messages has been a major focus. Only knowing whether a message contains an attack, however, is not always enough to m...
Kevin Borders, Atul Prakash, Mark Zielinski
« Prev « First page 1424 / 1656 Last » Next »