Sciweavers

1321 search results - page 178 / 265
» A Context Model for Personal Knowledge Management Applicatio...
Sort
View
KDD
2004
ACM
124views Data Mining» more  KDD 2004»
14 years 10 months ago
Eigenspace-based anomaly detection in computer systems
We report on an automated runtime anomaly detection method at the application layer of multi-node computer systems. Although several network management systems are available in th...
Hisashi Kashima, Tsuyoshi Idé
SIGIR
2004
ACM
14 years 3 months ago
Belief revision for adaptive information retrieval
Applying Belief Revision logic to model adaptive information retrieval is appealing since it provides a rigorous theoretical foundation to model partiality and uncertainty inheren...
Raymond Y. K. Lau, Peter Bruza, Dawei Song
DSONLINE
2006
79views more  DSONLINE 2006»
13 years 10 months ago
Integrating Security Policies via Container Portable Interceptors
In the past, it was very common to develop middleware without consideration of security from the very beginning. To integrate security, the middleware that should be protected has...
Tom Ritter, Rudolf Schreiner, Ulrich Lang
CIKM
2006
Springer
14 years 1 months ago
Mining blog stories using community-based and temporal clustering
In recent years, weblogs, or blogs for short, have become an important form of online content. The personal nature of blogs, online interactions between bloggers, and the temporal...
Arun Qamra, Belle L. Tseng, Edward Y. Chang
SIGCOMM
2009
ACM
14 years 4 months ago
Modeling and understanding end-to-end class of service policies in operational networks
Business and economic considerations are driving the extensive use of service differentiation in Virtual Private Networks (VPNs) operated for business enterprises today. The resul...
Yu-Wei Eric Sung, Carsten Lund, Mark Lyn, Sanjay G...