Sciweavers

3907 search results - page 723 / 782
» Information requirements engineering for data warehouse syst...
Sort
View
ESORICS
2004
Springer
15 years 7 months ago
Discovering Novel Attack Strategies from INFOSEC Alerts
Abstract. Correlating security alerts and discovering attack strategies are important and challenging tasks for security analysts. Recently, there have been several proposed techni...
Xinzhou Qin, Wenke Lee
AIRWEB
2008
Springer
15 years 3 months ago
Robust PageRank and locally computable spam detection features
Since the link structure of the web is an important element in ranking systems on search engines, web spammers widely use the link structure of the web to increase the rank of the...
Reid Andersen, Christian Borgs, Jennifer T. Chayes...
TASE
2010
IEEE
14 years 8 months ago
Robust Calibration for Localization in Clustered Wireless Sensor Networks
This paper presents a robust calibration procedure for clustered wireless sensor networks. Accurate calibration of between-node distances is one crucial step in localizing sensor n...
Jung Jin Cho, Yu Ding, Yong Chen, Jiong Tang
ICEIS
2005
IEEE
15 years 7 months ago
COCO: Composition Model and Composition Model Implementation
Component-based software engineering attempts to address the ever increasing demand for new software applications by enabling a compositional approach to software construction in ...
Naiyana Tansalarak, Kajal T. Claypool
WSC
2004
15 years 3 months ago
An Urban Terrain Abstraction to Support Decisionmaking Using Recursive Simulation
Recursive simulation is the technique of having simulated decisionmakers themselves use simulation to inform their decisionmaking. Issues of efficiency require that the recursive ...
John B. Gilmer Jr.