Sciweavers

10435 search results - page 1872 / 2087
» Measuring system normality
Sort
View
KDD
2010
ACM
188views Data Mining» more  KDD 2010»
15 years 1 months ago
Trust network inference for online rating data using generative models
In an online rating system, raters assign ratings to objects contributed by other users. In addition, raters can develop trust and distrust on object contributors depending on a f...
Freddy Chong Tat Chua, Ee-Peng Lim
169
Voted
MOBIHOC
2010
ACM
15 years 1 months ago
Fine-grained mobility characterization: steady and transient state behaviors
Recent popularization of personal hand-held mobile devices makes it important to characterize the mobility pattern of mobile device users, so as to accurately predict user mobilit...
Wei Gao, Guohong Cao
PVM
2010
Springer
15 years 1 months ago
Implementing MPI on Windows: Comparison with Common Approaches on Unix
Commercial HPC applications are often run on clusters that use the Microsoft Windows operating system and need an MPI implementation that runs efficiently in the Windows environmen...
Jayesh Krishna, Pavan Balaji, Ewing L. Lusk, Rajee...
RAID
2010
Springer
15 years 1 months ago
BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection
We introduce BotSwindler, a bait injection system designed to delude and detect crimeware by forcing it to reveal during the exploitation of monitored information. The implementati...
Brian M. Bowen, Pratap V. Prabhu, Vasileios P. Kem...
SEMWEB
2010
Springer
15 years 1 months ago
Exploiting Relation Extraction for Ontology Alignment
When multiple ontologies are used within one application system, aligning the ontologies is a prerequisite for interoperability and unhampered semantic navigation and search. Vario...
Elena Beisswanger
« Prev « First page 1872 / 2087 Last » Next »