Sciweavers

1167 search results - page 167 / 234
» On the Evaluation of Entity Profiles
Sort
View
IJNSEC
2008
95views more  IJNSEC 2008»
14 years 9 months ago
Generalized Anomaly Detection Model for Windows-based Malicious Program Behavior
In this paper we demonstrate that it is possible in general to detect Windows-based malicious program behavior. Since S. Forrest et al. used the N-grams method to classify system ...
Xin Tang, Constantine N. Manikopoulos, Sotirios G....
JSAC
2008
112views more  JSAC 2008»
14 years 9 months ago
System Design Considerations for Undersea Networks: Link and Multiple Access Protocols
Abstract--We address several inter-related aspects of underwater network design within the context of a cross-layer approach. We first highlight the impact of key characteristics o...
Nathan Parrish, Leonard T. Tracy, Sumit Roy, Payma...
MTA
2006
114views more  MTA 2006»
14 years 9 months ago
A structure-based approach for multimedia information filtering
While multimedia documents are sequentially presented to users, an information filtering (IF) system is useful to achieve a good retrieval performance in terms of both quality and ...
Dianhui Wang, Xiaodi Huang, Yong-Soo Kim, Joon Shi...
TSMC
2008
109views more  TSMC 2008»
14 years 9 months ago
Providing Justifications in Recommender Systems
Abstract--Recommender systems are gaining widespread acceptance in e-commerce applications to confront the "information overload" problem. Providing justification to a re...
Panagiotis Symeonidis, Alexandros Nanopoulos, Yann...
IJHPCA
2002
101views more  IJHPCA 2002»
14 years 9 months ago
SCALA: A Performance System For Scalable Computing
Lack of effective performance-evaluation environments is a major barrier to the broader use of high performance computing. Conventional performance environments are based on profi...
Xian-He Sun, Thomas Fahringer, Mario Pantano