Sciweavers

632 search results - page 74 / 127
» Performance Analysis of a Cluster File System
Sort
View
RECSYS
2009
ACM
15 years 4 months ago
Effective diverse and obfuscated attacks on model-based recommender systems
Robustness analysis research has shown that conventional memory-based recommender systems are very susceptible to malicious profile-injection attacks. A number of attack models h...
Zunping Cheng, Neil Hurley
ACSAC
2010
IEEE
14 years 10 months ago
Forenscope: a framework for live forensics
Current post-mortem cyber-forensic techniques may cause significant disruption to the evidence gathering process by breaking active network connections and unmounting encrypted di...
Ellick Chan, Shivaram Venkataraman, Francis M. Dav...
IAT
2007
IEEE
15 years 6 months ago
Tag Meaning Disambiguation through Analysis of Tripartite Structure of Folksonomies
Collaborative tagging systems are becoming very popular recently. Web users use freely-chosen tags to describe shared resources, resulting in a folksonomy. One problem of folksono...
Ching-man Au Yeung, Nicholas Gibbins, Nigel Shadbo...
PAMI
2006
193views more  PAMI 2006»
14 years 11 months ago
A System for Learning Statistical Motion Patterns
Analysis of motion patterns is an effective approach for anomaly detection and behavior prediction. Current approaches for the analysis of motion patterns depend on known scenes, w...
Weiming Hu, Xuejuan Xiao, Zhouyu Fu, Dan Xie, Tien...
HPDC
2005
IEEE
15 years 5 months ago
411 on scalable password service
In this paper we present 411, a password distribution system for high performance environments that provides security and scalability. We show that existing solutions such as NIS ...
Federico D. Sacerdoti, Mason J. Katz, Philip M. Pa...