Sciweavers

1310 search results - page 205 / 262
» Learning the k in k-means
Sort
View
ICSE
2008
IEEE-ACM
15 years 10 months ago
Effecting change: coordination in large-scale software development
Large-scale software development requires coordination within and between very large engineering teams, each of which may be located in different locations and time zones. Numerou...
Andrew Begel
MOBISYS
2005
ACM
15 years 9 months ago
The Horus WLAN location determination system
We present the design and implementation of the Horus WLAN location determination system. The design of the Horus system aims at satisfying two goals: high accuracy and low comput...
Moustafa Youssef, Ashok K. Agrawala
ESSOS
2010
Springer
15 years 6 months ago
Idea: Opcode-Sequence-Based Malware Detection
Malware is every malicious code that has the potential to harm any computer or network. The amount of malware is increasing faster every year and poses a serious security threat. H...
Igor Santos, Felix Brezo, Javier Nieves, Yoseba K....
CHI
2010
ACM
15 years 4 months ago
Input precision for gaze-based graphical passwords
Click-based graphical passwords have been proposed as alternatives to text-based passwords, despite being potentially vulnerable to shoulder-surfing, where an attacker can learn p...
Alain Forget, Sonia Chiasson, Robert Biddle
EUROSEC
2010
ACM
15 years 4 months ago
Differential privacy for collaborative security
Fighting global security threats with only a local view is inherently difficult. Internet network operators need to fight global phenomena such as botnets, but they are hampered...
Jason Reed, Adam J. Aviv, Daniel Wagner, Andreas H...