Sciweavers

140 search results - page 15 / 28
» The Recommendation Game: Using a Game-with-a-Purpose to Gene...
Sort
View
ACSAC
2006
IEEE
15 years 4 months ago
Practical Attack Graph Generation for Network Defense
Attack graphs are a valuable tool to network defenders, illustrating paths an attacker can use to gain access to a targeted network. Defenders can then focus their efforts on patc...
Kyle Ingols, Richard Lippmann, Keith Piwowarski
PAKDD
2009
ACM
135views Data Mining» more  PAKDD 2009»
15 years 5 months ago
On Mining Rating Dependencies in Online Collaborative Rating Networks
The trend of social information processing sees e-commerce and social web applications increasingly relying on user-generated content, such as rating, to determine the quality of o...
Hady Wirawan Lauw, Ee-Peng Lim, Ke Wang
ECAIW
2008
Springer
15 years 5 days ago
An Autonomous Algorithm for Generating and Merging Clinical Algorithms
Abstract. Procedural knowledge in medicine uses to come expressed as isolated sentences in Clinical Practice Guidelines (CPG) that describe how to act in front of specific health-c...
Francis Real, David Riaño
81
Voted
VLDB
2004
ACM
123views Database» more  VLDB 2004»
15 years 3 months ago
CORDS: Automatic Generation of Correlation Statistics in DB2
When query optimizers erroneously assume that database columns are statistically independent, they can underestimate the selectivities of conjunctive predicates by orders of magni...
Ihab F. Ilyas, Volker Markl, Peter J. Haas, Paul G...
LCPC
1994
Springer
15 years 2 months ago
Optimizing Array Distributions in Data-Parallel Programs
Data parallel programs are sensitive to the distribution of data across processor nodes. We formulate the reduction of inter-node communication as an optimization on a colored gra...
Krishna Kunchithapadam, Barton P. Miller