Sciweavers

5962 search results - page 862 / 1193
» Working with Patterns and Code
Sort
View
AUSAI
2006
Springer
15 years 8 months ago
Detecting Anomalies and Intruders
Brittleness is a well-known problem in expert systems where a conclusion can be made, which human common sense would recognise as impossible e.g. that a male is pregnant. We have e...
Akara Prayote, Paul Compton
AUSDM
2006
Springer
94views Data Mining» more  AUSDM 2006»
15 years 8 months ago
Marking Time in Sequence Mining
Sequence mining is often conducted over static and temporal datasets as well as over collections of events (episodes). More recently, there has also been a focus on the mining of ...
Carl Mooney, John F. Roddick
CAMAD
2006
IEEE
15 years 8 months ago
On the exploitation of user aggregation strategies in heterogeneous wireless networks
Abstract-- In this paper we discuss the exploitation of aggregated mobility patterns and physical proximity of nodes in a so-called ambient network, i.e., a wireless network with h...
Leonardo Badia, Nicola Bui, Marco Miozzo, Michele ...
134
Voted
CCS
2006
ACM
15 years 8 months ago
Puppetnets: misusing web browsers as a distributed attack infrastructure
Most of the recent work on Web security focuses on preventing attacks that directly harm the browser's host machine and user. In this paper we attempt to quantify the threat ...
V. T. Lam, Spyros Antonatos, Periklis Akritidis, K...
124
Voted
CIT
2006
Springer
15 years 8 months ago
Intelligent Query Tree (IQT) Protocol to Improve RFID Tag Read Efficiency
Radio Frequency Identification (RFID) is slated to become a standard for tagging various products. As more and more products become RFID enabled, fast tag identification mechanism...
Naval Bhandari, Anirudha Sahoo, Sridhar Iyer