Sciweavers

5326 search results - page 1042 / 1066
» On what we can ensure
Sort
View
105
Voted
CCS
2009
ACM
16 years 1 months ago
Automating analysis of large-scale botnet probing events
Botnets dominate today's attack landscape. In this work we investigate ways to analyze collections of malicious probing traffic in order to understand the significance of lar...
Zhichun Li, Anup Goyal, Yan Chen, Vern Paxson
128
Voted
KDD
2009
ACM
223views Data Mining» more  KDD 2009»
16 years 1 months ago
Collaborative filtering with temporal dynamics
Customer preferences for products are drifting over time. Product perception and popularity are constantly changing as new selection emerges. Similarly, customer inclinations are ...
Yehuda Koren
102
Voted
VLSID
2008
IEEE
166views VLSI» more  VLSID 2008»
16 years 26 days ago
Exploring the Processor and ISA Design for Wireless Sensor Network Applications
Power consumption, physical size, and architecture design of sensor node processors have been the focus of sensor network research in the architecture community. What lies at the ...
Shashidhar Mysore, Banit Agrawal, Frederic T. Chon...
89
Voted
CHI
2004
ACM
16 years 25 days ago
Affective sensors, privacy, and ethical contracts
Sensing affect raises critical privacy concerns, which are examined here using ethical theory, and with a study that illuminates the connection between ethical theory and privacy....
Carson Reynolds, Rosalind W. Picard
100
Voted
STOC
2005
ACM
135views Algorithms» more  STOC 2005»
16 years 24 days ago
On the bias of traceroute sampling: or, power-law degree distributions in regular graphs
Understanding the graph structure of the Internet is a crucial step for building accurate network models and designing efficient algorithms for Internet applications. Yet, obtaini...
Dimitris Achlioptas, Aaron Clauset, David Kempe, C...
« Prev « First page 1042 / 1066 Last » Next »