Sciweavers

6775 search results - page 1270 / 1355
» Diagnosis of Active Systems
Sort
View
ATAL
2007
Springer
14 years 2 months ago
Determining confidence when integrating contributions from multiple agents
Integrating contributions received from other agents is an essential activity in multi-agent systems (MASs). Not only must related contributions be integrated together, but the co...
Raphen Becker, Daniel D. Corkill
SIGIR
2010
ACM
14 years 2 months ago
Assessing the scenic route: measuring the value of search trails in web logs
Search trails mined from browser or toolbar logs comprise queries and the post-query pages that users visit. Implicit endorsements from many trails can be useful for search result...
Ryen W. White, Jeff Huang
SIGIR
2010
ACM
14 years 2 months ago
Uncovering social spammers: social honeypots + machine learning
Web-based social systems enable new community-based opportunities for participants to engage, share, and interact. This community value and related services like search and advert...
Kyumin Lee, James Caverlee, Steve Webb
ACSAC
2004
IEEE
14 years 2 months ago
RACOON: Rapidly Generating User Command Data For Anomaly Detection From Customizable Templates
One of the biggest obstacles faced by user command based anomaly detection techniques is the paucity of data. Gathering command data is a slow process often spanning months or yea...
Ramkumar Chinchani, Aarthie Muthukrishnan, Madhusu...
ATAL
2006
Springer
14 years 2 months ago
Certified reputation: how an agent can trust a stranger
Current computational trust models are usually built either on an agent's direct experience of an interaction partner (interaction trust) or reports provided by third parties...
Trung Dong Huynh, Nicholas R. Jennings, Nigel R. S...
« Prev « First page 1270 / 1355 Last » Next »