Sciweavers

7741 search results - page 1511 / 1549
» Security in Active Networks
Sort
View
KDD
2004
ACM
124views Data Mining» more  KDD 2004»
14 years 10 months ago
Eigenspace-based anomaly detection in computer systems
We report on an automated runtime anomaly detection method at the application layer of multi-node computer systems. Although several network management systems are available in th...
Hisashi Kashima, Tsuyoshi Idé
CHI
2006
ACM
14 years 10 months ago
Share and share alike: exploring the user interface affordances of file sharing
With the rapid growth of personal computer networks and the Internet, sharing files has become a central activity in computer use. The ways in which users control the what, how, a...
Stephen Voida, W. Keith Edwards, Mark W. Newman, R...
CHI
2001
ACM
14 years 10 months ago
ConNexus to awarenex: extending awareness to mobile users
We explored the use of awareness information to facilitate communication by developing a series of prototypes. The ConNexus prototype integrates awareness information, instant mes...
John C. Tang, Nicole Yankelovich, James Begole, Ma...
WWW
2010
ACM
14 years 5 months ago
Atomate it! end-user context-sensitive automation using heterogeneous information sources on the web
The transition of personal information management (PIM) tools off the desktop to the Web presents an opportunity to augment these tools with capabilities provided by the wealth o...
Max Van Kleek, Brennan Moore, David R. Karger, Pau...
RECOMB
2010
Springer
14 years 5 months ago
Incremental Signaling Pathway Modeling by Data Integration
Constructing quantitative dynamic models of signaling pathways is an important task for computational systems biology. Pathway model construction is often an inherently incremental...
Geoffrey Koh, David Hsu, P. S. Thiagarajan
« Prev « First page 1511 / 1549 Last » Next »