Sciweavers

2715 search results - page 535 / 543
» Database Publication Practices
Sort
View
CCS
2008
ACM
13 years 11 months ago
Mitigating DNS DoS attacks
This paper considers DoS attacks on DNS wherein attackers flood the nameservers of a zone to disrupt resolution of resource records belonging to the zone and consequently, any of ...
Hitesh Ballani, Paul Francis
EFDBS
2003
13 years 10 months ago
Four-Level-Architecture for Closure in Interoperability
A definition of types in an information system is given from ld abstractions through data constructs, schema and definitions to physical data values. Category theory suggests tha...
B. Nick Rossiter, Michael A. Heather
SDM
2004
SIAM
165views Data Mining» more  SDM 2004»
13 years 10 months ago
Visualizing RFM Segmentation
Segmentation based on RFM (Recency, Frequency, and Monetary) has been used for over 50 years by direct marketers to target a subset of their customers, save mailing costs, and imp...
Ron Kohavi, Rajesh Parekh
WEBNET
2000
13 years 10 months ago
New Approaches to Law Education: Making the Case for Web-based Learning
: Web-based instruction and online learning are changing customary practices in education. As conventional patterns for content delivery are influenced by new and improving technol...
Jennifer Gramling, Tom Galligan, Jean A. Derco
IJCAI
1989
13 years 10 months ago
Noise-Tolerant Instance-Based Learning Algorithms
Several published reports show that instancebased learning algorithms yield high classification accuracies and have low storage requirements during supervised learning application...
David W. Aha, Dennis F. Kibler