Sciweavers

478 search results - page 57 / 96
» Recommending based on rating frequencies
Sort
View
RAID
2004
Springer
15 years 5 months ago
Anomalous Payload-Based Network Intrusion Detection
We present a payload-based anomaly detector, we call PAYL, for intrusion detection. PAYL models the normal application payload of network traffic in a fully automatic, unsupervised...
Ke Wang, Salvatore J. Stolfo
JSAC
2006
143views more  JSAC 2006»
14 years 12 months ago
Capacity and QoS for a Scalable Ring-Based Wireless Mesh Network
The wireless mesh network (WMN) is an economical solution to support ubiquitous broadband services. This paper investigates the tradeoffs among quality-of-service (QoS), capacity, ...
Jane-Hwa Huang, Li-Chun Wang, Chung-Ju Chang
EWMF
2003
Springer
15 years 5 months ago
Semantically Enhanced Collaborative Filtering on the Web
Item-based Collaborative Filtering (CF) algorithms have been designed to deal with the scalability problems associated with traditional user-based CF approaches without sacrificin...
Bamshad Mobasher, Xin Jin, Yanzan Zhou
COMPSEC
2004
131views more  COMPSEC 2004»
14 years 11 months ago
Biometric random number generators
Abstract Up to now biometric methods have been used in cryptography for authentication purposes. In this paper we propose to use biological data for generating sequences of random ...
Janusz Szczepanski, Elek Wajnryb, José M. A...
AH
2008
Springer
15 years 6 months ago
Analysing High-Level Help-Seeking Behaviour in ITSs
Abstract. In this paper, we look at initial results of data mining students’ help-seeking behaviour in two ITSs: SQL-Tutor and EER-Tutor. We categorised help given by these tutor...
Moffat Mathews, Tanja Mitrovic, David Thomson