Sciweavers

1733 search results - page 140 / 347
» Self-Similarity in File Systems
Sort
View
GECCO
2005
Springer
132views Optimization» more  GECCO 2005»
15 years 10 months ago
Evolving computer intrusion scripts for vulnerability assessment and log analysis
Evolutionary computation is used to construct undetectable computer attack scripts. Using a simulated operating system, we show that scripts can be evolved to cover their tracks a...
Julien Budynek, Eric Bonabeau, Ben Shargel
IDEAL
2000
Springer
15 years 8 months ago
Real-Time Web Data Mining and Visualisation
This paper presents new services for intelligent monitoring and visualising user accesses to a university's web site. These are based on the use of data mining techniques to p...
Li Bai, Ni Guohua
HCI
2007
15 years 5 months ago
Performance Improvement of SCTP for Heterogeneous Ubiquitous Environment
SCTP(Stream Control Transmission Protocol) is a new IETF transport protocol over the IP network. Transport protocol is responsible for reliable delivery of a message form a host to...
Doo-Won Seo, Hyuncheol Kim, Jahwan Koo, Jinwook Ju...
HCI
2009
15 years 2 months ago
An Empirical Analysis of Personal Digital Document Structures
Hierarchies have long been used as useful structuring mechanisms for organizing and managing documents. This study looks at the problem of personal digital document management in t...
Sarah Henderson, Ananth Srinivasan
IPPS
2008
IEEE
15 years 11 months ago
Multi-threaded data mining of EDGAR CIKs (Central Index Keys) from ticker symbols
This paper describes how use the Java Swing HTMLEditorKit to perform multi-threaded web data mining on the EDGAR system (Electronic DataGathering, Analysis, and Retrieval system)....
Dougal A. Lyon