Sciweavers

373 search results - page 74 / 75
» Reclaiming Knowledge: A Case for Evidence-Based Information ...
Sort
View
COMCOM
2008
120views more  COMCOM 2008»
13 years 7 months ago
Game theoretic models for detecting network intrusions
In this paper, we study using game theory the problem of detecting intrusions in wired infrastructure networks. Detection is accomplished by sampling a subset of the transmitted p...
Hadi Otrok, Mona Mehrandish, Chadi Assi, Mourad De...
ICDE
2003
IEEE
157views Database» more  ICDE 2003»
14 years 8 months ago
Profile-Driven Cache Management
Modern distributed information systems cope with disconnection and limited bandwidth by using caches. In communicationconstrained situations, traditional demand-driven approaches ...
Mitch Cherniack, Eduardo F. Galvez, Michael J. Fra...
KDD
2009
ACM
260views Data Mining» more  KDD 2009»
14 years 8 months ago
Enabling analysts in managed services for CRM analytics
Data analytics tools and frameworks abound, yet rapid deployment of analytics solutions that deliver actionable insights from business data remains a challenge. The primary reason...
Indrajit Bhattacharya, Shantanu Godbole, Ajay Gupt...
COSIT
2009
Springer
106views GIS» more  COSIT 2009»
14 years 2 months ago
The Role of Angularity in Route Choice
Abstract. The paths of 2425 individual motorcycle trips made in London were analyzed in order to uncover the route choice decisions made by drivers. The paths were derived from glo...
Alasdair Turner
ATAL
2003
Springer
14 years 21 days ago
Trade of a problem-solving task
This paper focuses on a task allocation problem, particularly in cases where the task is to find a solution to a search problem or a constraint satisfaction problem. If the searc...
Shigeo Matsubara