Sciweavers

956 search results - page 176 / 192
» Data Mining Techniques for Security of Web Services
Sort
View
OZCHI
2006
ACM
14 years 1 months ago
Question-based group authentication
There are various situations where a distinction needs to be made between group members and outsiders. For example, to protect students in chat groups from unpleasant incidents ca...
Ann Nosseir, Richard C. H. Connor, Karen Renaud
DGO
2007
168views Education» more  DGO 2007»
13 years 8 months ago
A distributed event-triggered knowledge sharing system
Government agencies globally are facing problems such as illegal immigration, terrorism, and disease diagnosis and control. Solutions to these problems rely heavily on collaborati...
Seema Degwekar, Jeff DePree, Stanley Y. W. Su, How...
ICC
2011
IEEE
269views Communications» more  ICC 2011»
12 years 7 months ago
Experimental Evaluation of Memory Management in Content-Centric Networking
Abstract—Content-Centric Networking is a new communication architecture that rethinks the Internet communication model, designed for point-to-point connections between hosts, and...
Giovanna Carofiglio, Vinicius Gehlen, Diego Perino
RSFDGRC
2005
Springer
190views Data Mining» more  RSFDGRC 2005»
14 years 26 days ago
Finding Rough Set Reducts with SAT
Abstract. Feature selection refers to the problem of selecting those input features that are most predictive of a given outcome; a problem encountered in many areas such as machine...
Richard Jensen, Qiang Shen, Andrew Tuson
WWW
2009
ACM
14 years 8 months ago
Learning to recognize reliable users and content in social media with coupled mutual reinforcement
Community Question Answering (CQA) has emerged as a popular forum for users to pose questions for other users to answer. Over the last few years, CQA portals such as Naver and Yah...
Jiang Bian, Yandong Liu, Ding Zhou, Eugene Agichte...