Sciweavers

2316 search results - page 462 / 464
» How Asymmetric Is the Internet
Sort
View
ADC
2010
Springer
218views Database» more  ADC 2010»
14 years 11 months ago
Stock risk mining by news
Due to the fast delivery of news articles by news providers on the Internet and/or via news datafeeds, it becomes an important research issue of predicting the risk of stocks by u...
Qi Pan, Hong Cheng, Di Wu, Jeffrey Xu Yu, Yiping K...
TASE
2010
IEEE
14 years 10 months ago
Clear and Precise Specification of Ecological Data Management Processes and Dataset Provenance
Abstract--With the availability of powerful computational and communication systems, scientists now readily access large, complicated derived datasets and build on those results to...
Leon J. Osterweil, Lori A. Clarke, Aaron M. Elliso...
DIMVA
2011
14 years 7 months ago
Reverse Social Engineering Attacks in Online Social Networks
Social networks are some of the largest and fastest growing online services today. Facebook, for example, has been ranked as the second most visited site on the Internet, and has b...
Danesh Irani, Marco Balduzzi, Davide Balzarotti, E...
SACMAT
2011
ACM
14 years 6 months ago
Anomaly discovery and resolution in web access control policies
The advent of emerging technologies such as Web services, serviceoriented architecture, and cloud computing has enabled us to perform business services more efficiently and effec...
Hongxin Hu, Gail-Joon Ahn, Ketan Kulkarni
SIGMETRICS
2011
ACM
296views Hardware» more  SIGMETRICS 2011»
14 years 6 months ago
Cellular data network infrastructure characterization and implication on mobile content placement
Despite the tremendous growth in the cellular data network usage due to the popularity of smartphones, so far there is rather limited understanding of the network infrastructure o...
Qiang Xu, Junxian Huang, Zhaoguang Wang, Feng Qian...