Sciweavers

5723 search results - page 998 / 1145
» Managing the network
Sort
View
126
Voted
GROUP
2009
ACM
15 years 11 months ago
Grounding interpersonal privacy in mediated settings
Recent technologies supporting continuous connectivity enable sustained awareness within social networks, which eventually boosts interaction and therefore the need of individuals...
Natalia A. Romero, Panos Markopoulos
ICDM
2008
IEEE
179views Data Mining» more  ICDM 2008»
15 years 11 months ago
Detection and Exploration of Outlier Regions in Sensor Data Streams
Sensor networks play an important role in applications concerned with environmental monitoring, disaster management, and policy making. Effective and flexible techniques are need...
Conny Franke, Michael Gertz
INCDM
2010
Springer
159views Data Mining» more  INCDM 2010»
15 years 9 months ago
Semi-supervised Learning for False Alarm Reduction
Abstract. Intrusion Detection Systems (IDSs) which have been deployed in computer networks to detect a wide variety of attacks are suffering how to manage of a large number of tri...
Chien-Yi Chiu, Yuh-Jye Lee, Chien-Chung Chang, Wen...
IVS
2007
120views more  IVS 2007»
15 years 4 months ago
Visual exploration and analysis of historic hotel visits
Understanding the spatial and temporal characteristics of individual and group behavior in social networks is a critical component of visual tools for intelligence analysis, emerg...
Chris Weaver, David Fyfe, Anthony Robinson, Deryck...
SAC
2008
ACM
15 years 4 months ago
The tale of the weather worm
How humans behave when faced with a disaster, natural or man-made, can be exploited automatically by news-aware malicious software. We introduce weather worms, worms that can auto...
Joe Szabo, John Aycock, Randal Acton, Jörg De...