Sciweavers

8337 search results - page 1532 / 1668
» Reasoning With Characteristic Models
Sort
View
KDD
2012
ACM
205views Data Mining» more  KDD 2012»
13 years 7 months ago
Intrusion as (anti)social communication: characterization and detection
A reasonable definition of intrusion is: entering a community to which one does not belong. This suggests that in a network, intrusion attempts may be detected by looking for com...
Qi Ding, Natallia Katenka, Paul Barford, Eric D. K...
KDD
2012
ACM
243views Data Mining» more  KDD 2012»
13 years 7 months ago
Storytelling in entity networks to support intelligence analysts
Intelligence analysts grapple with many challenges, chief among them is the need for software support in storytelling, i.e., automatically ‘connecting the dots’ between dispar...
M. Shahriar Hossain, Patrick Butler, Arnold P. Boe...
AAAI
2012
13 years 7 months ago
POMDPs Make Better Hackers: Accounting for Uncertainty in Penetration Testing
Penetration Testing is a methodology for assessing network security, by generating and executing possible hacking attacks. Doing so automatically allows for regular and systematic...
Carlos Sarraute, Olivier Buffet, Jörg Hoffman...
GIS
2004
ACM
16 years 5 months ago
Grid metadata catalog service-based OGC web registry service
Grid is a promising e-Science infrastructure that promotes and facilitates the sharing and collaboration in the use of distributed heterogeneous resources through Virtual Organiza...
Peisheng Zhao, Aijun Chen, Yang Liu, Liping Di, We...
282
Voted
GIS
2006
ACM
16 years 5 months ago
Object localization based on directional information case of 2D vector data
If you were told that some object A was perfectly (or somewhat, or not at all) in some direction (e.g., west, above-right) of some reference object B, where in space would you loo...
Stelian Coros, JingBo Ni, Pascal Matsakis
« Prev « First page 1532 / 1668 Last » Next »