Sciweavers

1122 search results - page 182 / 225
» Information Retrieval in Network Administration
Sort
View
IRI
2006
IEEE
15 years 5 months ago
Applying the layered decision model to the design of language-based security systems
Safeguarding practices for networked systems involves decisions in at least three areas: identification of welldefined security policies, selection of cost-effective defense strat...
Huaqiang Wei, Jim Alves-Foss
SENSYS
2006
ACM
15 years 5 months ago
Data analysis tools for sensor-based science
Science is increasingly driven by data collected automatically from arrays of inexpensive sensors. The collected data volumes require a different approach from the scientists'...
Stuart Ozer, Jim Gray, Alexander S. Szalay, Andrea...
KES
2005
Springer
15 years 5 months ago
Design of a Digital Forensics Image Mining System
Increasing amount of illicit image data transmitted via the internet has triggered the need to develop effective image mining systems for digital forensics purposes. This paper dis...
Ross Brown, Binh Pham, Olivier Y. de Vel
CIKM
2003
Springer
15 years 5 months ago
Hierarchical graph indexing
Traffic analysis, in the context of Telecommunications or Internet and Web data, is crucial for large network operations. Data in such networks is often provided as large graphs w...
James Abello, Yannis Kotidis
JCDL
2010
ACM
148views Education» more  JCDL 2010»
15 years 4 months ago
Citing for high impact
The question of citation behavior has always intrigued scientists from various disciplines. While general citation patterns have been widely studied in the literature we develop t...
Xiaolin Shi, Jure Leskovec, Daniel A. McFarland