Sciweavers

325 search results - page 31 / 65
» Designing Good Deceptions in Defense of Information Systems
Sort
View
CEAS
2005
Springer
14 years 1 months ago
Implicit Queries for Email
Implicit query systems examine a document and automatically conduct searches for the most relevant information. In this paper, we offer three contributions to implicit query resea...
Joshua Goodman, Vitor R. Carvalho
WICSA
2004
13 years 9 months ago
Software Architecture for Large-Scale, Distributed, Data-Intensive Systems
The sheer amount of data produced by modern science research has created a need for the construction and understanding of "data-intensive systems", largescale, distribut...
Chris Mattmann, Daniel J. Crichton, J. Steven Hugh...
CSCW
2000
ACM
14 years 12 hour ago
Expertise recommender: a flexible recommendation system and architecture
Locating the expertise necessary to solve difficult problems is a nuanced social and collaborative problem. In organizations, some people assist others in locating expertise by ma...
David W. McDonald, Mark S. Ackerman
HICSS
2003
IEEE
103views Biometrics» more  HICSS 2003»
14 years 28 days ago
Toward More Robust Infrastructure: Observations on Improving the Resilience and Reliability of Critical Systems
Civil infrastructure provides the range of essential services generally necessary to support a nation’s economy and quality of life—arguably entire economies rely on the abili...
Richard G. Little
RSFDGRC
2005
Springer
156views Data Mining» more  RSFDGRC 2005»
14 years 1 months ago
Intrusion Detection System Based on Multi-class SVM
In this paper, we propose a new intrusion detection model, which keeps advantages of existing misuse detection model and anomaly detection model and resolves their problems. This ...
Hansung Lee, Jiyoung Song, Daihee Park