Sciweavers

1456 search results - page 50 / 292
» The Layer-Independent Descriptor Concept
Sort
View
131
Voted
CCR
2011
14 years 7 months ago
Misbehaviors in TCP SACK generation
While analyzing CAIDA Internet traces of TCP traffic to detect instances of data reneging, we frequently observed seven misbehaviors in the generation of SACKs. These misbehaviors...
Nasif Ekiz, Abuthahir Habeeb Rahman, Paul D. Amer
101
Voted
WWW
2011
ACM
14 years 7 months ago
Evaluation of valuable user generated content on social news web sites
Social news websites have gained significant popularity over the last few years. The participants of such websites are not only allowed to share news links but also to annotate, ...
Yana Volkovich, Andreas Kaltenbrunner
119
Voted
MEDES
2010
ACM
14 years 7 months ago
Negotiating and delegating obligations
In this paper, we describe a security model where users are allowed to control their obligations partially or totally, depending on the security policy. The main motivation of our...
Meriam Ben-Ghorbel-Talbi, Frédéric C...
SIGKDD
2010
125views more  SIGKDD 2010»
14 years 7 months ago
A framework for mining interesting pattern sets
This paper suggests a framework for mining subjectively interesting pattern sets that is based on two components: (1) the encoding of prior information in a model for the data min...
Tijl De Bie, Kleanthis-Nikolaos Kontonasios, Eirin...
118
Voted
ICONFERENCE
2011
14 years 7 months ago
Beyond promotion and protection: creators, audiences and common ground in user-generated media
In this paper, we present findings from a qualitative study of producers in a specific creative domain—online digital photography. We used social psychology and linguistic conce...
Eric C. Cook, Stephanie D. Teasley