Sciweavers

1863 search results - page 352 / 373
» Load-Reuse Analysis: Design and Evaluation
Sort
View
CCS
2003
ACM
15 years 5 months ago
Enhancing byte-level network intrusion detection signatures with context
Many network intrusion detection systems (NIDS) use byte sequences as signatures to detect malicious activity. While being highly efficient, they tend to suffer from a high false...
Robin Sommer, Vern Paxson
COLCOM
2009
IEEE
15 years 4 months ago
An analytical study of GWAP-based geospatial tagging systems
—Geospatial tagging (geotagging) is an emerging and very promising application that can help users find a wide variety of location-specific information, and facilitate the deve...
Ling-Jyh Chen, Yu-Song Syu, Bo-Chun Wang, Wang-Chi...
GIS
2009
ACM
15 years 4 months ago
REG^2: a regional regression framework for geo-referenced datasets
Traditional regression analysis derives global relationships between variables and neglects spatial variations in variables. Hence they lack the ability to systematically discover...
Oner Ulvi Celepcikay, Christoph F. Eick
WWW
2004
ACM
16 years 17 days ago
Smartback: supporting users in back navigation
This paper presents the design and user evaluation of SmartBack, a feature that complements the standard Back button by enabling users to jump directly to key pages in their navig...
Natasa Milic-Frayling, Rachel Jones, Kerry Rodden,...
KDD
2007
ACM
244views Data Mining» more  KDD 2007»
16 years 9 days ago
A Recommender System Based on Local Random Walks and Spectral Methods
In this paper, we design recommender systems for weblogs based on the link structure among them. We propose algorithms based on refined random walks and spectral methods. First, w...
Zeinab Abbassi, Vahab S. Mirrokni