Sciweavers

2399 search results - page 473 / 480
» Knowledge Management and the Design of Distributed Cognition...
Sort
View
IMC
2009
ACM
14 years 2 months ago
ANTIDOTE: understanding and defending against poisoning of anomaly detectors
Statistical machine learning techniques have recently garnered increased popularity as a means to improve network design and security. For intrusion detection, such methods build ...
Benjamin I. P. Rubinstein, Blaine Nelson, Ling Hua...
CIKM
2007
Springer
14 years 2 months ago
Finding and linking incidents in news
News reports are being produced and disseminated in overwhelming volume, making it difficult to keep up with the newest information. Most previous research in automatic news organ...
Ao Feng, James Allan
ACMICEC
2006
ACM
213views ECommerce» more  ACMICEC 2006»
14 years 2 months ago
CMieux: adaptive strategies for competitive supply chain trading
Supply chains are a central element of today’s global economy. Existing management practices consist primarily of static interactions between established partners. Global compet...
Michael Benisch, Alberto Sardinha, James Andrews, ...
EUROCRYPT
2004
Springer
14 years 1 months ago
Traceable Signatures
Abstract. This work presents a new privacy primitive called “Traceable Signatures”, together with an efficient provably secure implementation. To this end, we develop the unde...
Aggelos Kiayias, Yiannis Tsiounis, Moti Yung
SIGMOD
2010
ACM
305views Database» more  SIGMOD 2010»
14 years 1 months ago
MoveMine: mining moving object databases
With the maturity of GPS, wireless, and Web technologies, increasing amounts of movement data collected from various moving objects, such as animals, vehicles, mobile devices, and...
Zhenhui Li, Ming Ji, Jae-Gil Lee, Lu An Tang, Yint...