Sciweavers

413 search results - page 68 / 83
» Investigating User Browsing Behavior
Sort
View
JSS
2007
78views more  JSS 2007»
14 years 9 months ago
Understanding failure response in service discovery systems
Service discovery systems enable distributed components to find each other without prior arrangement, to express capabilities and needs, to aggregate into useful compositions, an...
Christopher Dabrowski, Kevin Mills, Stephen Quirol...
AINA
2008
IEEE
15 years 4 months ago
An Experience Improving Intrusion Detection Systems False Alarm Ratio by Using Honeypot
When traditional firewall and intrusion detection systems (IDS) are used to detect possible attacks from the network, they often make wrong decisions and block the legitimate conn...
Babak Khosravifar, Jamal Bentahar
154
Voted
NPC
2004
Springer
15 years 2 months ago
LEAPS: A Location Estimation and Action Prediction System in a Wireless LAN Environment
Abstract. Location estimation and user behavior recognition are research issues that go hand in hand. In the past, these two issues have been investigated separately. In this paper...
Qiang Yang, Yiqiang Chen, Jie Yin, Xiaoyong Chai
ICNP
2003
IEEE
15 years 2 months ago
A File-Centric Model for Peer-to-Peer File Sharing Systems
Peer-to-peer systems have quickly become a popular way for file sharing and distribution. In this paper, we focus on the subsystem consisting of peers and their actions relative ...
Li Zou, Mostafa H. Ammar
PVLDB
2008
77views more  PVLDB 2008»
14 years 9 months ago
Efficient network aware search in collaborative tagging sites
The popularity of collaborative tagging sites presents a unique opportunity to explore keyword search in a context where query results are determined by the opinion of a network o...
Sihem Amer-Yahia, Michael Benedikt, Laks V. S. Lak...