Sciweavers

46931 search results - page 9273 / 9387
» Networking the networks
Sort
View
73
Voted
IJSN
2006
65views more  IJSN 2006»
14 years 11 months ago
The loop fallacy and deterministic serialisation in tracing intrusion connections through stepping stones
: In order to conceal their identity and origin, network based intruders seldom attack directly from their own hosts, but rather stage their attacks through intermediate `stepping ...
Xinyuan Wang
CORR
2007
Springer
146views Education» more  CORR 2007»
14 years 11 months ago
The Long Term Fate of Our Digital Belongings: Toward a Service Model for Personal Archives
We conducted a preliminary field study to understand the current state of personal digital archiving in practice. Our aim is to design a service for the long-term storage, preserv...
Catherine C. Marshall, Sara A. Bly, Francoise Brun...
83
Voted
JCSS
2008
81views more  JCSS 2008»
14 years 11 months ago
A simulator for adaptive parallel applications
Dynamically allocating computing nodes to parallel applications is a promising technique for improving the utilization of cluster resources. Detailed simulations can help identify...
Basile Schaeli, Sebastian Gerlach, Roger D. Hersch
106
Voted
JCST
2008
124views more  JCST 2008»
14 years 11 months ago
Clustering by Pattern Similarity
The task of clustering is to identify classes of similar objects among a set of objects. The definition of similarity varies from one clustering model to another. However, in most ...
Haixun Wang, Jian Pei
101
Voted
CORR
2007
Springer
122views Education» more  CORR 2007»
14 years 11 months ago
Social Media as Windows on the Social Life of the Mind
This is a programmatic paper, marking out two directions in which the study of social media can contribute to broader problems of social science: understanding cultural evolution ...
Cosma Rohilla Shalizi
« Prev « First page 9273 / 9387 Last » Next »