Sciweavers

641 search results - page 5 / 129
» Identifying Contingency Requirements Using Obstacle Analysis
Sort
View
CISS
2008
IEEE
14 years 1 months ago
A lower-bound on the number of rankings required in recommender systems using collaborativ filtering
— We consider the situation where users rank items from a given set, and each user ranks only a (small) subset of all items. We assume that users can be classified into C classe...
Peter Marbach
SDM
2007
SIAM
86views Data Mining» more  SDM 2007»
13 years 9 months ago
Identifying Bundles of Product Options using Mutual Information Clustering
Mass-produced goods tend to be highly standardized in order to maximize manufacturing efficiencies. Some high-value goods with limited production quantities remain much less stand...
Claudia Perlich, Saharon Rosset
RE
2002
Springer
13 years 7 months ago
A Software Fault Tree Approach to Requirements Analysis of an Intrusion Detection System
Requirements analysis for an Intrusion Detection System (IDS) involves deriving requirements for the IDS from analysis of the intrusion domain. When the IDS is, as here, a collecti...
Guy G. Helmer, Johnny S. Wong, Mark Slagell, Vasan...
ACSAC
2010
IEEE
12 years 11 months ago
Friends of an enemy: identifying local members of peer-to-peer botnets using mutual contacts
In this work we show that once a single peer-to-peer (P2P) bot is detected in a network, it may be possible to efficiently identify other members of the same botnet in the same ne...
Baris Coskun, Sven Dietrich, Nasir D. Memon
RE
2002
Springer
13 years 7 months ago
Analyzing Website Privacy Requirements Using a Privacy Goal Taxonomy
Privacy has recently become a prominent issue in the context of electronic commerce websites. Increasingly, privacy policies posted on such websites are receiving considerable att...
Annie I. Antón, Julia Brande Earp, Angela R...