Sciweavers

8468 search results - page 1530 / 1694
» The Technology of Data Stashing
Sort
View
81
Voted
IMC
2007
ACM
14 years 11 months ago
Legal issues surrounding monitoring during network research
This work was motivated by a discussion that two of the coauthors (computer science professors) had with the other coauthor (a law professor and a former computer crime Trial Atto...
Douglas C. Sicker, Paul Ohm, Dirk Grunwald
85
Voted
IMC
2007
ACM
14 years 11 months ago
Passive online rogue access point detection using sequential hypothesis testing with TCP ACK-pairs
Rogue (unauthorized) wireless access points pose serious security threats to local networks. In this paper, we propose two online algorithms to detect rogue access points using se...
Wei Wei, Kyoungwon Suh, Bing Wang, Yu Gu, Jim Kuro...
86
Voted
IMC
2007
ACM
14 years 11 months ago
Learning network structure from passive measurements
The ability to discover network organization, whether in the form of explicit topology reconstruction or as embeddings that approximate topological distance, is a valuable tool. T...
Brian Eriksson, Paul Barford, Robert Nowak, Mark C...
BCS
2008
14 years 11 months ago
A Customisable Multiprocessor for Application-Optimised Inductive Logic Programming
This paper describes a customisable processor designed to accelerate execution of inductive logic programming, targeting advanced field-programmable gate array (FPGA) technology. ...
Andreas Fidjeland, Wayne Luk, Stephen Muggleton
87
Voted
ECIR
2010
Springer
14 years 11 months ago
Goal-Driven Collaborative Filtering - A Directional Error Based Approach
Collaborative filtering is one of the most effective techniques for making personalized content recommendation. In the literature, a common experimental setup in the modeling phase...
Tamas Jambor, Jun Wang
« Prev « First page 1530 / 1694 Last » Next »