Sciweavers

5723 search results - page 1100 / 1145
» Network Management
Sort
View
118
Voted
KDD
2008
ACM
195views Data Mining» more  KDD 2008»
15 years 11 months ago
Anomaly pattern detection in categorical datasets
We propose a new method for detecting patterns of anomalies in categorical datasets. We assume that anomalies are generated by some underlying process which affects only a particu...
Kaustav Das, Jeff G. Schneider, Daniel B. Neill
91
Voted
JUCS
2010
160views more  JUCS 2010»
14 years 9 months ago
LCP-Nets: A Linguistic Approach for Non-functional Preferences in a Semantic SOA Environment
Abstract: This paper addresses the problem of expressing preferences among nonfunctional properties of services in a Web service architecture. In such a context, semantic and non-f...
Pierre Châtel, Isis Truck, Jacques Malenfant
EDBT
2006
ACM
174views Database» more  EDBT 2006»
15 years 11 months ago
Fast Computation of Reachability Labeling for Large Graphs
The need of processing graph reachability queries stems from many applications that manage complex data as graphs. The applications include transportation network, Internet traffic...
Jiefeng Cheng, Jeffrey Xu Yu, Xuemin Lin, Haixun W...
EUROSYS
2007
ACM
15 years 8 months ago
Antiquity: exploiting a secure log for wide-area distributed storage
Antiquity is a wide-area distributed storage system designed to provide a simple storage service for applications like file systems and back-up. The design assumes that all serve...
Hakim Weatherspoon, Patrick R. Eaton, Byung-Gon Ch...
85
Voted
SOUPS
2009
ACM
15 years 5 months ago
Who's viewed you?: the impact of feedback in a mobile location-sharing application
Feedback is viewed as an essential element of ubiquitous computing systems in the HCI literature for helping people manage their privacy. However, the success of online social net...
Janice Y. Tsai, Patrick Gage Kelley, Paul Hankes D...
« Prev « First page 1100 / 1145 Last » Next »