Sciweavers

2522 search results - page 338 / 505
» Tools for Heterogeneous Network Computing
Sort
View
133
Voted
AINA
2007
IEEE
15 years 9 months ago
Extracting Significant Phrases from Text
Prospective readers can quickly determine whether a document is relevant to their information need if the significant phrases (or keyphrases) in this document are provided. Althou...
Yuan J. Lui, Richard Brent, Ani Calinescu
DSN
2005
IEEE
15 years 9 months ago
Towards a Theory of Insider Threat Assessment
Insider attacks are a well-known problem acknowledged as a threat as early as 1980s. The threat is attributed to legitimate users who abuse their privileges, and given their famil...
Ramkumar Chinchani, Anusha Iyer, Hung Q. Ngo, Sham...
193
Voted
RAID
1999
Springer
15 years 7 months ago
Anomaly Intrusion Detection Systems: Handling Temporal Relations Between Events
Lately, many approaches have been developed to discover computer abuse. Some of them use data mining techniques to discover anomalous behavior in audit trail, considering this beh...
Alexandr Seleznyov, Seppo Puuronen
SC
1994
ACM
15 years 7 months ago
PARAMICS - moving vehicles on the connection machine
PARAMICS is a PARAllel MICroscopic Traffic Simulator which is, to our knowledge, the most powerful of its type in the world. The simulator can model around 200,000 vehicles on aro...
Gordon Cameron, Brian J. N. Wylie, David McArthur
CHI
2004
ACM
16 years 3 months ago
User profiling
A number of global trends have a large influence on the way we use technology in our life and work, like: ? increasing connectivity and connected devices (any time, any place, any...
Johan Schuurmans, Boris E. R. de Ruyter, Harry van...