Sciweavers

2924 search results - page 572 / 585
» On the Use of Evidence in Neural Networks
Sort
View
IMC
2006
ACM
15 years 5 months ago
A multifaceted approach to understanding the botnet phenomenon
The academic community has long acknowledged the existence of malicious botnets, however to date, very little is known about the behavior of these distributed computing platforms....
Moheeb Abu Rajab, Jay Zarfoss, Fabian Monrose, And...
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
15 years 4 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
CHI
1993
ACM
15 years 4 months ago
Exploring the applications of user-expertise assessment for intelligent interfaces
An adaptive user interface relies, to a large extent, upon an adequate user model (e.g., a representationof user-expertise). However, building a user model may be a tedious and ti...
Michel Desmarais, Jiming Liu
INFOSCALE
2007
ACM
15 years 1 months ago
Query-driven indexing for scalable peer-to-peer text retrieval
We present a query-driven algorithm for the distributed indexing of large document collections within structured P2P networks. To cope with bandwidth consumption that has been ide...
Gleb Skobeltsyn, Toan Luu, Ivana Podnar Zarko, Mar...
ECIS
2003
15 years 1 months ago
From traditional to virtual organisation: implications for work unit boundaries
Boundary and virtual organisation theory were used to study the implications of organisation level virtualisation for work units. A single case study in a geographically dispersed...
Christopher J. Hemingway, Karin Breu