Sciweavers

2269 search results - page 357 / 454
» Behavioral Intrusion Detection
Sort
View
TAICPART
2010
IEEE
133views Education» more  TAICPART 2010»
13 years 8 months ago
Localizing Defects in Multithreaded Programs by Mining Dynamic Call Graphs
Abstract. Writing multithreaded software for multicore computers confronts many developers with the difficulty of finding parallel programming errors. In the past, most parallel d...
Frank Eichinger, Victor Pankratius, Philipp W. L. ...
UM
2010
Springer
13 years 8 months ago
User Modeling for Telecommunication Applications: Experiences and Practical Implications
Abstract. Telecommunication applications based on user modeling focus on extracting customer behavior and preferences from the information implicitly included in Call Detail Record...
Heath Hohwald, Enrique Frías-Martíne...
MASS
2010
157views Communications» more  MASS 2010»
13 years 8 months ago
Spatial extension of the Reality Mining Dataset
Data captured from a live cellular network with the real users during their common daily routine help to understand how the users move within the network. Unlike the simulations wi...
Michal Ficek, Lukas Kencl
SOCIALCOM
2010
13 years 8 months ago
Precursors and Laggards: An Analysis of Semantic Temporal Relationships on a Blog Network
We explore the hypothesis that it is possible to obtain information about the dynamics of a blog network by analysing the temporal relationships between blogs at a semantic level, ...
Telmo Menezes, Camille Roth, Jean-Philippe Cointet
TSMC
2010
13 years 4 months ago
Advances in View-Invariant Human Motion Analysis: A Review
Abstract--As viewpoint issue is becoming a bottleneck for human motion analysis and its application, in recent years, researchers have been devoted to view-invariant human motion a...
Xiaofei Ji, Honghai Liu