Sciweavers

1647 search results - page 251 / 330
» Distributing private data in challenged network environments
Sort
View
UAI
2008
15 years 1 months ago
CT-NOR: Representing and Reasoning About Events in Continuous Time
We present a generative model for representing and reasoning about the relationships among events in continuous time. We apply the model to the domain of networked and distributed...
Aleksandr Simma, Moisés Goldszmidt, John Ma...
IPTPS
2005
Springer
15 years 5 months ago
Clustering in P2P Exchanges and Consequences on Performances
— We propose here an analysis of a rich dataset which gives an exhaustive and dynamic view of the exchanges processed in a running eDonkey system. We focus on correlation in term...
Stevens Le-Blond, Jean-Loup Guillaume, Matthieu La...
SDM
2008
SIAM
105views Data Mining» more  SDM 2008»
15 years 1 months ago
Gaussian Process Learning for Cyber-Attack Early Warning
Network security has been a serious concern for many years. For example, firewalls often record thousands of exploit attempts on a daily basis. Network administrators could benefi...
Jian Zhang 0004, Phillip A. Porras, Johannes Ullri...
CIKM
2009
Springer
15 years 3 months ago
Terminology mining in social media
The highly variable and dynamic word usage in social media presents serious challenges for both research and those commercial applications that are geared towards blogs or other u...
Magnus Sahlgren, Jussi Karlgren
SPAA
2003
ACM
15 years 5 months ago
Novel architectures for P2P applications: the continuous-discrete approach
We propose a new approach for constructing P2P networks based on a dynamic decomposition of a continuous space into cells corresponding to servers. We demonstrate the power of thi...
Moni Naor, Udi Wieder