Sciweavers

2868 search results - page 475 / 574
» Inference in Bayesian Networks
Sort
View
CSCW
2011
ACM
14 years 8 months ago
Browse and discover: social file sharing in the enterprise
There is a growth in the popularity of social file sharing systems. This paper describes the design of Cattail, a social file sharing system for the enterprise. Through a ‘Recen...
N. Sadat Shami, Michael J. Muller, David R. Millen
MOBIHOC
2008
ACM
16 years 4 months ago
Delegation forwarding
Mobile opportunistic networks are characterized by unpredictable mobility, heterogeneity of contact rates and lack of global information. Successful delivery of messages at low co...
Vijay Erramilli, Mark Crovella, Augustin Chaintrea...
SDM
2008
SIAM
105views Data Mining» more  SDM 2008»
15 years 5 months ago
Gaussian Process Learning for Cyber-Attack Early Warning
Network security has been a serious concern for many years. For example, firewalls often record thousands of exploit attempts on a daily basis. Network administrators could benefi...
Jian Zhang 0004, Phillip A. Porras, Johannes Ullri...
CCS
2009
ACM
15 years 11 months ago
On non-cooperative location privacy: a game-theoretic analysis
In mobile networks, authentication is a required primitive of the majority of security protocols. However, an adversary can track the location of mobile nodes by monitoring pseudo...
Julien Freudiger, Mohammad Hossein Manshaei, Jean-...
WWW
2009
ACM
16 years 5 months ago
Collective privacy management in social networks
Social Networking is one of the major technological phenomena of the Web 2.0, with hundreds of millions of people participating. Social networks enable a form of self expression f...
Anna Cinzia Squicciarini, Mohamed Shehab, Federica...