Sciweavers

1591 search results - page 307 / 319
» Associating network flows with user and application informat...
Sort
View
IDT
2010
138views more  IDT 2010»
13 years 5 months ago
Challenging computer software frontiers and the human resistance to change
This paper examines the driving and opposing forces that are governing the current paradigm shift from a data-processing information technology environment without software intell...
Jens Pohl
KDD
2012
ACM
185views Data Mining» more  KDD 2012»
11 years 9 months ago
A framework for summarizing and analyzing twitter feeds
The firehose of data generated by users on social networking and microblogging sites such as Facebook and Twitter is enormous. Real-time analytics on such data is challenging wit...
Xintian Yang, Amol Ghoting, Yiye Ruan, Srinivasan ...
ACSAC
2007
IEEE
14 years 1 months ago
Bonsai: Balanced Lineage Authentication
The provenance of a piece of data is of utility to a wide range of applications. Its availability can be drastically increased by automatically collecting lineage information duri...
Ashish Gehani, Ulf Lindqvist
ICDM
2005
IEEE
190views Data Mining» more  ICDM 2005»
14 years 10 days ago
Neighborhood Formation and Anomaly Detection in Bipartite Graphs
Many real applications can be modeled using bipartite graphs, such as users vs. files in a P2P system, traders vs. stocks in a financial trading system, conferences vs. authors ...
Jimeng Sun, Huiming Qu, Deepayan Chakrabarti, Chri...
PETRA
2009
ACM
14 years 1 months ago
Ambient kitchen: designing situated services using a high fidelity prototyping environment
The Ambient Kitchen is a high fidelity prototype for exploring the design of pervasive computing algorithms and applications for everyday environments. The environment integrates ...
Patrick Olivier, Guangyou Xu, Andrew Monk, Jesse H...