Sciweavers

325 search results - page 51 / 65
» Designing Good Deceptions in Defense of Information Systems
Sort
View
OSDI
2008
ACM
14 years 8 months ago
Disk Drive Workload Captured in Logs Collected During the Field Return Incoming Test
Hard disk drives returned back to Seagate undergo the Field Return Incoming Test. During the test, the available logs in disk drives are collected, if possible. These logs contain...
Alma Riska, Erik Riedel
ICDM
2005
IEEE
168views Data Mining» more  ICDM 2005»
14 years 1 months ago
A Scalable Collaborative Filtering Framework Based on Co-Clustering
Collaborative filtering-based recommender systems, which automatically predict preferred products of a user using known preferences of other users, have become extremely popular ...
Thomas George, Srujana Merugu
UIST
2010
ACM
13 years 5 months ago
Eden: supporting home network management through interactive visual tools
As networking moves into the home, home users are increasingly being faced with complex network management chores. Previous research, however, has demonstrated the difficulty many...
Jeonghwa Yang, W. Keith Edwards, David Haslem
WWW
2010
ACM
14 years 2 months ago
Context-aware citation recommendation
When you write papers, how many times do you want to make some citations at a place but you are not sure which papers to cite? Do you wish to have a recommendation system which ca...
Qi He, Jian Pei, Daniel Kifer, Prasenjit Mitra, C....
CLEF
2006
Springer
13 years 11 months ago
CLEF 2006: Ad Hoc Track Overview
We describe the objectives and organization of the CLEF 2006 ad hoc track and discuss the main characteristics of the tasks offered to test monolingual, bilingual, and multilingual...
Giorgio Maria Di Nunzio, Nicola Ferro, Thomas Mand...