Sciweavers

1328 search results - page 258 / 266
» Design Patterns for Modelling Guidelines
Sort
View
KDD
2008
ACM
259views Data Mining» more  KDD 2008»
14 years 8 months ago
Using ghost edges for classification in sparsely labeled networks
We address the problem of classification in partially labeled networks (a.k.a. within-network classification) where observed class labels are sparse. Techniques for statistical re...
Brian Gallagher, Hanghang Tong, Tina Eliassi-Rad, ...
WISEC
2010
ACM
14 years 2 months ago
pBMDS: a behavior-based malware detection system for cellphone devices
Computing environments on cellphones, especially smartphones, are becoming more open and general-purpose, thus they also become attractive targets of malware. Cellphone malware no...
Liang Xie, Xinwen Zhang, Jean-Pierre Seifert, Senc...
SAC
2010
ACM
14 years 2 months ago
Adaptive fuzzy-valued service selection
Service composition concerns both integration of heterogeneous distributed applications and dynamic selection of services. QoS-aware selection enables a service requester with cer...
Davide Bacciu, Maria Grazia Buscemi, Lusine Mkrtch...
WSDM
2009
ACM
176views Data Mining» more  WSDM 2009»
14 years 2 months ago
The web changes everything: understanding the dynamics of web content
The Web is a dynamic, ever changing collection of information. This paper explores changes in Web content by analyzing a crawl of 55,000 Web pages, selected to represent different...
Eytan Adar, Jaime Teevan, Susan T. Dumais, Jonatha...
CSFW
2009
IEEE
14 years 2 months ago
More Anonymous Onion Routing Through Trust
We consider using trust information to improve the anonymity provided by onion-routing networks. In particular, we introduce a model of trust in network nodes and use it to design...
Aaron Johnson, Paul F. Syverson