Sciweavers

363 search results - page 63 / 73
» Modeling Attack Behaviors in Rating Systems
Sort
View
ICSE
2007
IEEE-ACM
14 years 7 months ago
Analysis of a Redundant Architecture for Critical Infrastructure Protection
Critical infrastructures like the power grid are emerging as collection of existing separated systems of different nature which are interconnected together. Their criticality becom...
Alessandro Daidone, Andrea Bondavalli, Paulo Ver&i...
TMM
2011
146views more  TMM 2011»
13 years 2 months ago
Game-Theoretic Strategies and Equilibriums in Multimedia Fingerprinting Social Networks
Abstract—Multimedia social network is a network infrastructure in which the social network users share multimedia contents with all different purposes. Analyzing user behavior in...
W. Sabrina Lin, H. Vicky Zhao, K. J. Ray Liu
ATAL
2006
Springer
13 years 11 months ago
Convergence analysis for collective vocabulary development
We study how decentralized agents can develop a shared vocabulary without global coordination. Answering this question can help us understand the emergence of many communication s...
Jun Wang, Les Gasser, Jim Houk
KDD
2001
ACM
359views Data Mining» more  KDD 2001»
14 years 8 months ago
Data mining techniques to improve forecast accuracy in airline business
Predictive models developed by applying Data Mining techniques are used to improve forecasting accuracy in the airline business. In order to maximize the revenue on a flight, the ...
Christoph Hueglin, Francesco Vannotti
WSC
2007
13 years 10 months ago
Estimating the probability of a rare event over a finite time horizon
We study an approximation for the zero-variance change of measure to estimate the probability of a rare event in a continuous-time Markov chain. The rare event occurs when the cha...
Pieter-Tjerk de Boer, Pierre L'Ecuyer, Gerardo Rub...