Sciweavers

1251 search results - page 182 / 251
» Management of User Preferences in Data Intensive Application...
Sort
View
163
Voted
KDD
2007
ACM
201views Data Mining» more  KDD 2007»
16 years 4 months ago
Structural and temporal analysis of the blogosphere through community factorization
The blogosphere has unique structural and temporal properties since blogs are typically used as communication media among human individuals. In this paper, we propose a novel tech...
Yun Chi, Shenghuo Zhu, Xiaodan Song, Jun'ichi Tate...
149
Voted
KDD
2005
ACM
153views Data Mining» more  KDD 2005»
16 years 4 months ago
Using retrieval measures to assess similarity in mining dynamic web clickstreams
While scalable data mining methods are expected to cope with massive Web data, coping with evolving trends in noisy data in a continuous fashion, and without any unnecessary stopp...
Olfa Nasraoui, Cesar Cardona, Carlos Rojas
129
Voted
EUROSYS
2008
ACM
16 years 22 days ago
Eudaemon: involuntary and on-demand emulation against zero-day exploits
Eudaemon is a technique that aims to blur the borders between protected and unprotected applications, and brings together honeypot technology and end-user intrusion detection and ...
Georgios Portokalidis, Herbert Bos
138
Voted
MDM
2004
Springer
147views Communications» more  MDM 2004»
15 years 9 months ago
Mobile Agents: Can They Assist with Context Awareness?
This position paper argues that the mobile agents paradigm is a useful and important technology enabling pervasive and ubiquitous computing. Context awareness drives adaptability ...
Arkady B. Zaslavsky
156
Voted
EWSPT
2003
Springer
15 years 9 months ago
Providing Highly Automated and Generic Means for Software Deployment Process
We present a new approach for the management and enactment of deployment process by a deployment processor ORYA (Open enviRonment to deploY Applications). ORYA aims to integrate te...
Vincent Lestideau, Noureddine Belkhatir