Sciweavers

9162 search results - page 1524 / 1833
» System and User Data Complexity
Sort
View
IJNSEC
2008
115views more  IJNSEC 2008»
15 years 4 months ago
Improving Security Through Analysis of Log Files Intersections
The paper discusses our research in development of general and systematic methods for intrusion prevention. The key idea is to use data mining techniques to discover repeated patt...
Kazimierz Kowalski, Mohsen Beheshti
COLING
2002
15 years 4 months ago
A Methodology for Terminology-based Knowledge Acquisition and Integration
In this paper we propose an integrated knowledge management system in which terminology-based knowledge acquisition, knowledge integration, and XML-based knowledge retrieval are c...
Hideki Mima, Sophia Ananiadou, Goran Nenadic, Jun-...
SPIRE
2010
Springer
15 years 2 months ago
Fingerprinting Ratings for Collaborative Filtering - Theoretical and Empirical Analysis
Abstract. We consider fingerprinting methods for collaborative filtering (CF) systems. In general, CF systems show their real strength when supplied with enormous data sets. Earl...
Yoram Bachrach, Ralf Herbrich
CORR
2010
Springer
114views Education» more  CORR 2010»
15 years 2 months ago
Efficiently Discovering Hammock Paths from Induced Similarity Networks
ty networks are important abstractions in many information management applications such as recommender systems, corpora analysis, and medical informatics. For instance, in a recom...
M. Shahriar Hossain, Michael Narayan, Naren Ramakr...
WOA
2010
15 years 2 months ago
Using Mobile Agents for Secure Biometric Authentication
This paper deals with the definition of a strong authentication model, coupling usual password/PIN based methods with a biometric matching, over a Multi Agent distributed infrastru...
Marco Tranquillin, Carlo Ferrari, Michele Moro
« Prev « First page 1524 / 1833 Last » Next »