Sciweavers

1386 search results - page 208 / 278
» Towards mature IT services
Sort
View
HICSS
2008
IEEE
98views Biometrics» more  HICSS 2008»
15 years 6 months ago
Improvements in Security Alert Analysis with a Truth Maintenance System
A high percentage of false positives remains a problem in current network security detection systems. With the growing reliance of industry on computer networks, and the growing v...
Albert Tang, Pradeep Ray, Lundy Lewis
NOMS
2008
IEEE
15 years 6 months ago
Tracking back the root cause of a path change in interdomain routing
—Interdomain routes change over time, and it is impressive to observe up to which extent. Routes may change many times in the same day and sometimes in the same hour or minute. S...
Alessio Campisano, Luca Cittadini, Giuseppe Di Bat...
HICSS
2007
IEEE
135views Biometrics» more  HICSS 2007»
15 years 6 months ago
Extending the Applicability of Recommender Systems: A Multilayer Framework for Matching Human Resources
Recommender Systems (RS) so far have been applied to many fields of e-commerce in order to assist users in finding the products that best meet their preferences. However, while th...
Tobias Keim
NDSS
2007
IEEE
15 years 6 months ago
Army of Botnets
The trend toward smaller botnets may be more dangerous than large botnets, in terms of large-scale attacks like distributed denials of service. We examine the possibility of “su...
Ryan Vogt, John Aycock, Michael J. Jacobson Jr.
ARCS
2007
Springer
15 years 6 months ago
Architecture for Collaborative Business Items
Sensor network technology is pushing towards integration into the business world. By using sensor node hardware to augment real life business items it is possible to capture the wo...
Till Riedel, Christian Decker, Phillip Scholl, Alb...