Sciweavers

272 search results - page 39 / 55
» Dependability Analysis: A New Application for Run-Time Recon...
Sort
View
TKDE
2002
67views more  TKDE 2002»
13 years 7 months ago
Recovery from Malicious Transactions
Preventive measures sometimes fail to deflect malicious attacks. In this paper, we adopt an information warfare perspective, which assumes success by the attacker in achieving part...
Paul Ammann, Sushil Jajodia, Peng Liu
JMLR
2010
194views more  JMLR 2010»
13 years 2 months ago
Graphical Gaussian modelling of multivariate time series with latent variables
In time series analysis, inference about causeeffect relationships among multiple times series is commonly based on the concept of Granger causality, which exploits temporal struc...
Michael Eichler
CHI
2003
ACM
14 years 7 months ago
A context-aware experience sampling tool
A new software tool for user-interface development and assessment of ubiquitous computing applications is available for CHI researchers. The software permits researchers to use co...
Stephen S. Intille, John Rondoni, Chuck Kukla, Isa...
LCN
2006
IEEE
14 years 1 months ago
Practical Evaluation of the Performance Impact of Security Mechanisms in Sensor Networks
Security has become a major concern for many realworld applications for wireless sensor networks (WSN). In this domain, many security solutions have been proposed. Usually, all th...
Martin Passing, Falko Dressler
WWW
2011
ACM
13 years 1 months ago
Automatic construction of a context-aware sentiment lexicon: an optimization approach
The explosion of Web opinion data has made essential the need for automatic tools to analyze and understand people’s sentiments toward different topics. In most sentiment analy...
Yue Lu, Malú Castellanos, Umeshwar Dayal, C...