Sciweavers

455 search results - page 36 / 91
» Controllability and observability of uncertain systems: A ro...
Sort
View
RECSYS
2009
ACM
14 years 1 months ago
Effective diverse and obfuscated attacks on model-based recommender systems
Robustness analysis research has shown that conventional memory-based recommender systems are very susceptible to malicious profile-injection attacks. A number of attack models h...
Zunping Cheng, Neil Hurley
HICSS
2009
IEEE
98views Biometrics» more  HICSS 2009»
14 years 3 months ago
Methodological Approaches to Measuring the Effects of Implementation of Health Information Technology (HIT)
The research design, evaluation methodology, and statistical analysis of the clinical efficacy of healthcare information technology (HIT) implementation can be a challenging task....
Lance Roberts, Marcia M. Ward, Jane M. Brokel, Dou...
DIMVA
2007
13 years 10 months ago
Measurement and Analysis of Autonomous Spreading Malware in a University Environment
Abstract. Autonomous spreading malware in the form of bots or worms is a constant threat in today’s Internet. In the form of botnets, networks of compromised machines that can be...
Jan Goebel, Thorsten Holz, Carsten Willems
CGO
2005
IEEE
14 years 2 months ago
Reactive Techniques for Controlling Software Speculation
Aggressive software speculation holds significant potential, because it enables program transformations to reduce the program’s critical path. Like any form of speculation, how...
Craig B. Zilles, Naveen Neelakantam
CDC
2008
IEEE
188views Control Systems» more  CDC 2008»
13 years 10 months ago
A method for stereo-vision based tracking for robotic applications
Vision based tracking of an object using the ideas of perspective projection inherently consists of nonlinearly modelled measurements although the underlying dynamic system that en...
Pubudu N. Pathirana, Adrian N. Bishop, Andrey V. S...