Sciweavers

744 search results - page 138 / 149
» Studying Knowledge Management System Success in System Admin...
Sort
View
COMCOM
2008
120views more  COMCOM 2008»
13 years 7 months ago
Game theoretic models for detecting network intrusions
In this paper, we study using game theory the problem of detecting intrusions in wired infrastructure networks. Detection is accomplished by sampling a subset of the transmitted p...
Hadi Otrok, Mona Mehrandish, Chadi Assi, Mourad De...
ICDE
2010
IEEE
252views Database» more  ICDE 2010»
14 years 7 months ago
Semantic Ranking and Result Visualization for Life Sciences Publications
An ever-increasing amount of data and semantic knowledge in the domain of life sciences is bringing about new data management challenges. In this paper we focus on adding the seman...
Julia Stoyanovich, Kenneth A. Ross, William Mee
WWW
2005
ACM
14 years 8 months ago
Named graphs, provenance and trust
The Semantic Web consists of many RDF graphs nameable by URIs. This paper extends the syntax and semantics of RDF to cover such Named Graphs. This enables RDF statements that desc...
Jeremy J. Carroll, Christian Bizer, Patrick J. Hay...
CHI
2008
ACM
14 years 8 months ago
SuperBreak: using interactivity to enhance ergonomic typing breaks
Repetitive strain injuries and ergonomics concerns have become increasingly significant health issues as a growing number of individuals frequently use computers for long periods ...
Dan Morris, A. J. Bernheim Brush, Brian Meyers
ICC
2009
IEEE
168views Communications» more  ICC 2009»
14 years 2 months ago
Optimal Sleep-Wake Policies for an Energy Harvesting Sensor Node
—We study a sensor node with an energy harvesting source. In any slot, the sensor node is in one of two modes: Wake or Sleep. The generated energy is stored in a buffer. The sens...
Vinay Joseph, Vinod Sharma, Utpal Mukherji