Sciweavers

4555 search results - page 886 / 911
» Informing the Development of Calendar Systems for Domestic U...
Sort
View
KDD
2009
ACM
210views Data Mining» more  KDD 2009»
14 years 2 months ago
Modeling and predicting user behavior in sponsored search
Implicit user feedback, including click-through and subsequent browsing behavior, is crucial for evaluating and improving the quality of results returned by search engines. Severa...
Josh Attenberg, Sandeep Pandey, Torsten Suel
HICSS
2007
IEEE
111views Biometrics» more  HICSS 2007»
14 years 1 months ago
An Empirical Analysis of Fraud Detection in Online Auctions: Credit Card Phantom Transaction
The online auction is a well-known business model that shows how business can be changed with the aid of new technologies. On the other hand, although the online auction allows bu...
Myungsin Chae, Seonyoung Shim, Hyungjun Cho, Byung...
SENSYS
2003
ACM
14 years 24 days ago
Model-based compression in wireless ad hoc networks
We present a technique for compression of shortest paths routing tables for wireless ad hoc networks. The main characteristic of such networks is that geographic location of nodes...
Milenko Drinic, Darko Kirovski, Miodrag Potkonjak
CCS
2003
ACM
14 years 24 days ago
Enhancing byte-level network intrusion detection signatures with context
Many network intrusion detection systems (NIDS) use byte sequences as signatures to detect malicious activity. While being highly efficient, they tend to suffer from a high false...
Robin Sommer, Vern Paxson
RIDE
2002
IEEE
14 years 14 days ago
A Scheme for Integrating e-Services in Establishing Virtual Enterprises
An important aspect of Business to Business ECommerce is the agile Virtual Enterprise (VE). VEs are established when existing enterprises dynamically form temporary alliances, joi...
Alan Berfield, Panos K. Chrysanthis, Ioannis Tsama...