Sciweavers

2309 search results - page 328 / 462
» Patterns for Technology Companies
Sort
View
IMC
2007
ACM
15 years 6 months ago
A brief history of scanning
Incessant scanning of hosts by attackers looking for vulnerable servers has become a fact of Internet life. In this paper we present an initial study of the scanning activity obse...
Mark Allman, Vern Paxson, Jeff Terrell
161
Voted
ICWS
2008
IEEE
15 years 6 months ago
A Temporal Data-Mining Approach for Discovering End-to-End Transaction Flows
Effective management of Web Services systems relies on accurate understanding of end-to-end transaction flows, which may change over time as the service composition evolves. This ...
Ting Wang, Chang-Shing Perng, Tao Tao, Chunqiang T...
SDM
2007
SIAM
146views Data Mining» more  SDM 2007»
15 years 6 months ago
ROAM: Rule- and Motif-Based Anomaly Detection in Massive Moving Object Data Sets
With recent advances in sensory and mobile computing technology, enormous amounts of data about moving objects are being collected. One important application with such data is aut...
Xiaolei Li, Jiawei Han, Sangkyum Kim, Hector Gonza...
ECSCW
2003
15 years 6 months ago
Applying Cyber-Archaeology
Online spaces that enable public shared inter-personal communications are of significant social and economic importance. This paper outlines a theoretical model and methodology, la...
Quentin Jones
NIPS
2003
15 years 6 months ago
Increase Information Transfer Rates in BCI by CSP Extension to Multi-class
Brain-Computer Interfaces (BCI) are an interesting emerging technology that is driven by the motivation to develop an effective communication interface translating human intention...
Guido Dornhege, Benjamin Blankertz, Gabriel Curio,...