Sciweavers

3099 search results - page 180 / 620
» Generating Web Monitors
Sort
View
USS
2004
15 years 4 months ago
Autograph: Toward Automated, Distributed Worm Signature Detection
Today's Internet intrusion detection systems (IDSes) monitor edge networks' DMZs to identify and/or filter malicious flows. While an IDS helps protect the hosts on its l...
Hyang-Ah Kim, Brad Karp
153
Voted
ICCE
2007
114views Education» more  ICCE 2007»
15 years 4 months ago
Investigating the Reuse of Course Generation Knowledge
: Course generation knowledge, i.e., how to assemble a sequence of learning objects which is adapted to a learner’s goals, competencies and preferences, is hard to assess and exp...
Carsten Ullrich, Qinghua Chen, Sushing Chen, Lipin...
115
Voted
ICDE
2006
IEEE
133views Database» more  ICDE 2006»
15 years 9 months ago
A New Approach for Reactive Web Usage Data Processing
— Web usage mining exploits data mining techniques to discover valuable information from navigation behavior of World Wide Web (WWW) users. The required information is captured b...
Murat Ali Bayir, Ismail Hakki Toroslu, Ahmet Cosar
BIS
2007
178views Business» more  BIS 2007»
15 years 4 months ago
A Conversion Process From Flickr Tags to RDF Descriptions
The recent evolution of the Web, now designated by the term Web 2.0, has seen the appearance of a huge number of resources created and annotated by users. However the annotations ...
Mohamed Zied Maala, Alexandre Delteil, Ahmed Azoug...
BROADNETS
2007
IEEE
15 years 9 months ago
Modeling and generating TCP application workloads
Abstract — In order to perform valid experiments, traffic generators used in network simulators and testbeds require up to date models of traffic as it exists on real network lin...
Félix Hernández-Campos, Kevin Jeffay...