Sciweavers

1988 search results - page 309 / 398
» Securing Information Transfer in Distributed Computing Envir...
Sort
View
CCS
2003
ACM
14 years 2 months ago
Enhancing byte-level network intrusion detection signatures with context
Many network intrusion detection systems (NIDS) use byte sequences as signatures to detect malicious activity. While being highly efficient, they tend to suffer from a high false...
Robin Sommer, Vern Paxson
SIGIR
2002
ACM
13 years 8 months ago
Collaborative filtering with privacy via factor analysis
Collaborative filtering (CF) is valuable in e-commerce, and for direct recommendations for music, movies, news etc. But today's systems have several disadvantages, including ...
John F. Canny
CIKM
2008
Springer
13 years 11 months ago
Intra-document structural frequency features for semi-supervised domain adaptation
In this work we try to bridge the gap often encountered by researchers who find themselves with few or no labeled examples from their desired target domain, yet still have access ...
Andrew Arnold, William W. Cohen
CSCW
2000
ACM
14 years 1 months ago
Data management support for asynchronous groupware
In asynchronous collaborative applications, users usually collaborate accessing and modifying shared information independently. We have designed and implemented a replicated objec...
Nuno M. Preguiça, José Legatheaux Ma...
DAC
1995
ACM
14 years 15 days ago
The Case for Design Using the World Wide Web
— Most information and services required today by designers will soon become available as documents distributed in a wide area hypermedia network. New integration services are re...
Mário J. Silva, Randy H. Katz