Sciweavers

1056 search results - page 95 / 212
» Identifying and Exploiting Ultrametricity
Sort
View
ASUNAM
2009
IEEE
14 years 5 months ago
Dynamics of Inter-Meeting Time in Human Contact Networks
—We envision new communication paradigms, using physical dynamic interconnectedness among people. Delay Tolerant Networks (DTNs) are a new communication paradigm to support such ...
Eiko Yoneki, Dan Greenfield, Jon Crowcroft
CIKM
2009
Springer
14 years 2 months ago
Efficient feature weighting methods for ranking
Feature weighting or selection is a crucial process to identify an important subset of features from a data set. Removing irrelevant or redundant features can improve the generali...
Hwanjo Yu, Jinoh Oh, Wook-Shin Han
ISSA
2008
13 years 11 months ago
Social Aspects of Information Security
Social Engineering (SE) threats have constituted a reality for Information Technology (IT) systems for many years. Yet, even the latest editions of the generally accepted Informat...
Evangelos Frangopoulos, Mariki M. Eloff, Lucas M. ...
WWW
2006
ACM
14 years 10 months ago
SecuBat: a web vulnerability scanner
As the popularity of the web increases and web applications become tools of everyday use, the role of web security has been gaining importance as well. The last years have shown a...
Christopher Krügel, Engin Kirda, Nenad Jovano...
CSE
2009
IEEE
14 years 4 months ago
Analysing BitTorrent's Seeding Strategies
Abstract— BitTorrent is a typical peer-to-peer (P2P) file distribution application that has gained tremendous popularity in recent years. A considerable amount of research exists...
Xinuo Chen, Stephen A. Jarvis