Sciweavers

1931 search results - page 235 / 387
» A BitTorrent Performance Evaluation Framework
Sort
View
PVLDB
2010
125views more  PVLDB 2010»
13 years 7 months ago
Interesting-Phrase Mining for Ad-Hoc Text Analytics
Large text corpora with news, customer mail and reports, or Web 2.0 contributions offer a great potential for enhancing business-intelligence applications. We propose a framework ...
Srikanta J. Bedathur, Klaus Berberich, Jens Dittri...
SPRINGSIM
2010
13 years 7 months ago
SES-based ontological process for high level information fusion
—Data Fusion (DF) process is in the interest of the military community since it provides the opportunity to achieve information superiority. The System Entity Structure (SES) is ...
Hojun Lee, Bernard P. Zeigler
GLOBECOM
2010
IEEE
13 years 7 months ago
Identifying Insider-Based Jammers in Multi-Channel Wireless Networks
Abstract-- We consider the problem of identifying insiderbased attacks in the form of jammers in multi-channel wireless networks, where jammers have the inside knowledge of frequen...
Hoang Nguyen, Thadpong Pongthawornkamol, Klara Nah...
ICDM
2010
IEEE
226views Data Mining» more  ICDM 2010»
13 years 7 months ago
Edge Weight Regularization over Multiple Graphs for Similarity Learning
The growth of the web has directly influenced the increase in the availability of relational data. One of the key problems in mining such data is computing the similarity between o...
Pradeep Muthukrishnan, Dragomir R. Radev, Qiaozhu ...
CISC
2009
Springer
148views Cryptology» more  CISC 2009»
13 years 7 months ago
Using Strategy Objectives for Network Security Analysis
The anticipation game framework is an extension of attack graphs based on game theory. It is used to anticipate and analyze intruder and administrator concurrent interactions with ...
Elie Bursztein, John C. Mitchell