Sciweavers

1501 search results - page 267 / 301
» Distributed Data Mining Models as Services on the Grid
Sort
View
USENIX
2001
15 years 1 months ago
MEF: Malicious Email Filter - A UNIX Mail Filter That Detects Malicious Windows Executables
We present Malicious Email Filter, MEF, a freely distributed malicious binary filter incorporated into Procmail that can detect malicious Windows attachments by integrating with a...
Matthew G. Schultz, Eleazar Eskin, Erez Zadok, Man...
ISADS
1999
IEEE
15 years 4 months ago
A Secure Key Registration System based on Proactive Secret-Sharing Scheme
We designed a secure key registration system based on the proactive secret-sharing scheme. A user can register important data such as a session key to a distributed system in a (t...
Masayuki Numao
CCECE
2006
IEEE
15 years 5 months ago
A QoS Mapping Rule Builder
Although many QoS management architectures have been recently introduced with a lot of advanced features, they have never been widely used in the existing applications due to the ...
Kim Khoa Nguyen, Brigitte Kerhervé, Brigitt...
OTM
2010
Springer
14 years 9 months ago
On the Expressiveness and Trade-Offs of Large Scale Tuple Stores
Massive-scale distributed computing is a challenge at our doorstep. The current exponential growth of data calls for massive-scale capabilities of storage and processing. This is b...
Ricardo Vilaça, Francisco Cruz, Rui Carlos ...
KDD
2009
ACM
192views Data Mining» more  KDD 2009»
16 years 9 days ago
Learning optimal ranking with tensor factorization for tag recommendation
Tag recommendation is the task of predicting a personalized list of tags for a user given an item. This is important for many websites with tagging capabilities like last.fm or de...
Steffen Rendle, Leandro Balby Marinho, Alexandros ...