Sciweavers

3544 search results - page 556 / 709
» Information Security in Open Systems
Sort
View
HAIS
2008
Springer
15 years 9 days ago
A WeVoS-CBR Approach to Oil Spill Problem
The hybrid intelligent system presented here, forecasts the presence or not of oil slicks in a certain area of the open sea after an oil spill using CaseBased Reasoning methodology...
Emilio Corchado, Bruno Baruque, Aitor Mata, Juan M...
ESE
2006
97views Database» more  ESE 2006»
14 years 11 months ago
An empirical study of fine-grained software modifications
Software is typically improved and modified in small increments (we refer to each of these increments as a modification record--MR). MRs are usually stored in a configuration manag...
Daniel M. Germán
NLE
2007
148views more  NLE 2007»
14 years 10 months ago
Abbreviated text input using language modeling
We address the problem of improving the efficiency of natural language text input under degraded conditions (for instance, on mobile computing devices or by disabled users), by ta...
Stuart M. Shieber, Rani Nelken
MINENET
2006
ACM
15 years 5 months ago
SC2D: an alternative to trace anonymization
Progress in networking research depends crucially on applying novel analysis tools to real-world traces of network activity. This often conflicts with privacy and security requir...
Jeffrey C. Mogul, Martin F. Arlitt
CCS
2011
ACM
13 years 11 months ago
SURF: detecting and measuring search poisoning
Search engine optimization (SEO) techniques are often abused to promote websites among search results. This is a practice known as blackhat SEO. In this paper we tackle a newly em...
Long Lu, Roberto Perdisci, Wenke Lee