Sciweavers

9182 search results - page 1764 / 1837
» Requirements for Requirements Management Tools
Sort
View
KDD
2005
ACM
149views Data Mining» more  KDD 2005»
14 years 3 months ago
A distributed learning framework for heterogeneous data sources
We present a probabilistic model-based framework for distributed learning that takes into account privacy restrictions and is applicable to scenarios where the different sites ha...
Srujana Merugu, Joydeep Ghosh
RAID
2005
Springer
14 years 3 months ago
Sequence Number-Based MAC Address Spoof Detection
Abstract. The exponential growth in the deployment of IEEE 802.11based wireless LAN (WLAN) in enterprises and homes makes WLAN an attractive target for attackers. Attacks that expl...
Fanglu Guo, Tzi-cker Chiueh
VLDB
2005
ACM
180views Database» more  VLDB 2005»
14 years 3 months ago
Cache-conscious Frequent Pattern Mining on a Modern Processor
In this paper, we examine the performance of frequent pattern mining algorithms on a modern processor. A detailed performance study reveals that even the best frequent pattern min...
Amol Ghoting, Gregory Buehrer, Srinivasan Parthasa...
CCS
2005
ACM
14 years 3 months ago
Fast and automated generation of attack signatures: a basis for building self-protecting servers
Large-scale attacks, such as those launched by worms and zombie farms, pose a serious threat to our network-centric society. Existing approaches such as software patches are simpl...
Zhenkai Liang, R. Sekar
ACMICEC
2004
ACM
106views ECommerce» more  ACMICEC 2004»
14 years 3 months ago
Measuring e-government impact: existing practices and shortcomings
Public administrations of all over the world invest an enormous amount of resources in e-government. How the success of egovernment can be measured is often not clear. E-governmen...
Rob M. Peters, Marijn Janssen, Tom M. van Engers
« Prev « First page 1764 / 1837 Last » Next »