Sciweavers

531 search results - page 74 / 107
» An Argumentation-Based Approach for Practical Reasoning
Sort
View
128
Voted
PTS
2007
120views Hardware» more  PTS 2007»
15 years 5 months ago
Towards Systematic Signature Testing
: The success and the acceptance of intrusion detection systems essentially depend on the accuracy of their analysis. Inaccurate signatures strongly trigger false alarms. In practi...
Sebastian Schmerl, Hartmut König
118
Voted
TSP
2010
14 years 10 months ago
Improved dual decomposition based optimization for DSL dynamic spectrum management
Dynamic spectrum management (DSM) has been recognized as a key technology to significantly improve the performance of digital subscriber line (DSL) broadband access networks. The b...
Paschalis Tsiaflakis, Ion Necoara, Johan A. K. Suy...
136
Voted
KDD
2006
ACM
172views Data Mining» more  KDD 2006»
16 years 4 months ago
Attack detection in time series for recommender systems
Recent research has identified significant vulnerabilities in recommender systems. Shilling attacks, in which attackers introduce biased ratings in order to influence future recom...
Sheng Zhang, Amit Chakrabarti, James Ford, Fillia ...
CHI
2007
ACM
16 years 4 months ago
Supporting multidisciplinary collaboration: requirements from novel HCI education
Many collaborative design tools may suffer from being too generic to address the specific complexities inherent in multidisciplinary collaboration. We provide accounts of several ...
Piotr D. Adamczyk, Michael B. Twidale
ICFP
2008
ACM
16 years 3 months ago
Typed iterators for XML
XML transformations are very sensitive to types: XML types describe the tags and attributes of XML elements as well as the number, kind, and order of their sub-elements. Therefore,...
Giuseppe Castagna, Kim Nguyen