Sciweavers

7544 search results - page 1406 / 1509
» Network Forensics Analysis
Sort
View
CHI
2009
ACM
16 years 4 months ago
Making sense of strangers' expertise from signals in digital artifacts
Contemporary work increasingly involves interacting with strangers in technology-mediated environments. In this context, we come to rely on digital artifacts to infer characterist...
N. Sadat Shami, Kate Ehrlich, Geri Gay, Jeffrey T....
SIGMOD
2003
ACM
209views Database» more  SIGMOD 2003»
16 years 4 months ago
Distributed Top-K Monitoring
The querying and analysis of data streams has been a topic of much recent interest, motivated by applications from the fields of networking, web usage analysis, sensor instrumenta...
Brian Babcock, Chris Olston
EDBT
2006
ACM
190views Database» more  EDBT 2006»
16 years 4 months ago
Fast Approximate Wavelet Tracking on Streams
Recent years have seen growing interest in effective algorithms for summarizing and querying massive, high-speed data streams. Randomized sketch synopses provide accurate approxima...
Graham Cormode, Minos N. Garofalakis, Dimitris Sac...
WSDM
2010
ACM
315views Data Mining» more  WSDM 2010»
16 years 1 months ago
SBotMiner: Large Scale Search Bot Detection
In this paper, we study search bot traffic from search engine query logs at a large scale. Although bots that generate search traffic aggressively can be easily detected, a large ...
Fang Yu, Yinglian Xie, Qifa Ke
ICCAD
2002
IEEE
141views Hardware» more  ICCAD 2002»
16 years 26 days ago
A hierarchical modeling framework for on-chip communication architectures
— The communication sub-system of complex IC systems is increasingly critical for achieving system performance. Given this, it is important that the on-chip communication archite...
Xinping Zhu, Sharad Malik
« Prev « First page 1406 / 1509 Last » Next »