Sciweavers

825 search results - page 142 / 165
» Internal Iteration Externalized
Sort
View
EUROSYS
2006
ACM
14 years 4 months ago
Understanding user behavior in large-scale video-on-demand systems
Video-on-demand over IP (VOD) is one of the best-known examples of “next-generation” Internet applications cited as a goal by networking and multimedia researchers. Without em...
Hongliang Yu, Dongdong Zheng, Ben Y. Zhao, Weimin ...
WWW
2010
ACM
14 years 2 months ago
Empirical comparison of algorithms for network community detection
Detecting clusters or communities in large real-world graphs such as large social or information networks is a problem of considerable interest. In practice, one typically chooses...
Jure Leskovec, Kevin J. Lang, Michael W. Mahoney
ACSAC
2009
IEEE
14 years 2 months ago
The Good, the Bad, And the Ugly: Stepping on the Security Scale
: Metrics are both fashionable and timely: many regulations that affect cybersecurity rely upon metrics – albeit, of the checklist variety in many cases – to ascertain complian...
Mary Ann Davidson
ICDM
2009
IEEE
125views Data Mining» more  ICDM 2009»
14 years 2 months ago
A Fully Automated Method for Discovering Community Structures in High Dimensional Data
—Identifying modules, or natural communities, in large complex networks is fundamental in many fields, including social sciences, biological sciences and engineering. Recently s...
Jianhua Ruan
ACNS
2009
Springer
157views Cryptology» more  ACNS 2009»
14 years 2 months ago
Malyzer: Defeating Anti-detection for Application-Level Malware Analysis
Abstract. Malware analysis is critical for malware detection and prevention. To defeat malware analysis and detection, today malware commonly adopts various sophisticated anti-dete...
Lei Liu, Songqing Chen