Sciweavers

1478 search results - page 4 / 296
» Modeling user activities in a large IPTV system
Sort
View
COMCOM
2008
135views more  COMCOM 2008»
14 years 9 months ago
Peer-to-peer system-based active worm attacks: Modeling, analysis and defense
Active worms continue to pose major threats to the security of today's Internet. This is due to the ability of active worms to automatically propagate themselves and compromi...
Wei Yu, Sriram Chellappan, Xun Wang, Dong Xuan

Publication
164views
14 years 9 months ago
Kangaroo: Video Seeking in P2P Systems
A key challenge faced by peer-to-peer(P2P) video-on- demand (VoD) systems is their ability, or lack thereof, to provide DVD-like functionality, such as pause, forward and backward ...
Xiaoyuan Yang, Minas Gjoka, Parminder Chhabra, Ath...
ANSS
2006
IEEE
15 years 3 months ago
USim: A User Behavior Simulation Framework for Training and Testing IDSes in GUI Based Systems
Anomaly detection systems largely depend on user profile data to be able to detect deviation from normal activity. Most of this profile data is based on commands executed by use...
Ashish Garg, Vidyaraman Sankaranarayanan, Shambhu ...
SIGIR
1996
ACM
15 years 1 months ago
Evaluating User Interfaces to Information Retrieval Systems: A Case Study on User Support
Designing good user interfaces to information retrieval systems is a complex activity. The design space is large and evaluation methodologies that go beyond the classical precisio...
Giorgio Brajnik, Stefano Mizzaro, Carlo Tasso
WWW
2010
ACM
15 years 4 months ago
Collaborative location and activity recommendations with GPS history data
With the increasing popularity of location-based services, such as tour guide and location-based social network, we now have accumulated many location data on the Web. In this pap...
Vincent Wenchen Zheng, Yu Zheng, Xing Xie, Qiang Y...