Sciweavers

5009 search results - page 954 / 1002
» Mapping Human Networks
Sort
View
ISSA
2004
14 years 11 months ago
Applying Similarities Between Immune Systems And Mobile Agent Systems In Intrusion Detection
Nearly all present-day commercial intrusion detection systems are based on a hierarchical architecture. Nodes at the bottom of the hierarchy collect information, which is passed t...
Marek Zielinski
IAAI
1993
14 years 11 months ago
COMPAQ QuickSource: Providing the Consumer with the Power of Artificial Intelligence
This paper describes COMPAQ QuickSource, an electronic problem-solving and information system for Compaq’s line of networked printers. A major goal in designing this system was ...
Trung Nguyen, Mary Czerwinski, Dan Lee
ATAL
2010
Springer
14 years 11 months ago
Decentralized hash tables for mobile robot teams solving intra-logistics tasks
Although a remarkably high degree of automation has been reached in production and intra-logistics nowadays, human labor is still used for transportation using handcarts and forkl...
D. Sun, A. Kleiner, Christian Schindelhauer
CCS
2010
ACM
14 years 10 months ago
Detecting and characterizing social spam campaigns
Online social networks (OSNs) are popular collaboration and communication tools for millions of users and their friends. Unfortunately, in the wrong hands, they are also effective...
Hongyu Gao, Jun Hu, Christo Wilson, Zhichun Li, Ya...
SIGCOMM
2010
ACM
14 years 10 months ago
Unbiased sampling in directed social graph
Microblogging services, such as Twitter, are among the most important online social networks(OSNs). Different from OSNs such as Facebook, the topology of microblogging service is ...
Tianyi Wang, Yang Chen, Zengbin Zhang, Peng Sun, B...