Sciweavers

495 search results - page 46 / 99
» Modeling the Vulnerability Discovery Process
Sort
View
ATAL
2007
Springer
14 years 4 months ago
An incentive mechanism for message relaying in unstructured peer-to-peer systems
Distributed message relaying is an important function of a peer-topeer system to discover service providers. Existing search protocols in unstructured peer-to-peer systems either ...
Cuihong Li, Bin Yu, Katia P. Sycara
ADAPTIVE
2007
Springer
14 years 4 months ago
Data Mining for Web Personalization
Abstract. In this chapter we present an overview of Web personalization process viewed as an application of data mining requiring support for all the phases of a typical data minin...
Bamshad Mobasher
KDD
2002
ACM
115views Data Mining» more  KDD 2002»
14 years 10 months ago
Collaborative crawling: mining user experiences for topical resource discovery
The rapid growth of the world wide web had made the problem of topic speci c resource discovery an important one in recent years. In this problem, it is desired to nd web pages wh...
Charu C. Aggarwal
CSSC
2008
110views more  CSSC 2008»
13 years 10 months ago
Bayesian False Discovery Rate Wavelet Shrinkage: Theory and Applications
The interest in inference in the wavelet domain remains vibrant area of statistical research because of needs of scientific community to process and explore massive data sets. Prim...
Ilya Lavrik, Yoon Young Jung, Fabrizio Ruggeri, Br...
MOBIHOC
2008
ACM
14 years 9 months ago
Localized distance-sensitive service discovery in wireless sensor networks
In this paper, we identify a new problem in wireless sensor networks, distance sensitive service discovery, where nearby or closest service selection guarantee is expected. We pro...
Xu Li, Nicola Santoro, Ivan Stojmenovic