Sciweavers

2009 search results - page 170 / 402
» Towards Self-Configuring Networks
Sort
View
145
Voted
HICSS
2008
IEEE
98views Biometrics» more  HICSS 2008»
15 years 11 months ago
Improvements in Security Alert Analysis with a Truth Maintenance System
A high percentage of false positives remains a problem in current network security detection systems. With the growing reliance of industry on computer networks, and the growing v...
Albert Tang, Pradeep Ray, Lundy Lewis
CSCW
2006
ACM
15 years 10 months ago
Actor centrality correlates to project based coordination
In this study, we draw on network centrality concepts and coordination theory to understand how project team members interact when working towards a common goal. A text-mining app...
Liaquat Hossain, Andrè Wu, Kon Shing Kennet...
152
Voted
PERCOM
2005
ACM
15 years 10 months ago
Design and Implementation of "kubit" for Sensing and Control Ubiquitous Applications
Towards the wide acceptance of ubiquitous networking, practical and deployable ubiquitous applications must be provided in a concrete and easily understandable form to end-users. ...
Kiyohito Yoshihara, Shinji Motegi, Hiroki Horiuchi
ECSQARU
2001
Springer
15 years 9 months ago
An Empirical Investigation of the K2 Metric
Abstract. The K2 metric is a well-known evaluation measure (or scoring function) for learning Bayesian networks from data [7]. It is derived by assuming uniform prior distributions...
Christian Borgelt, Rudolf Kruse
CSE
2009
IEEE
15 years 5 months ago
Representing Small Group Evolution
: Understanding the dynamics of network evolution rests in part on the representation chosen to characterize the evolutionary process. We offer a simple, three-parameter representa...
Whitman Richards, Nicholas C. Wormald