Sciweavers

472 search results - page 36 / 95
» Taking Topic Detection From Evaluation to Practice
Sort
View
WCNC
2010
IEEE
14 years 26 days ago
MUTON: Detecting Malicious Nodes in Disruption-Tolerant Networks
—The Disruption Tolerant Networks (DTNs) are vulnerable to insider attacks, in which the legitimate nodes are compromised and the adversary modifies the delivery metrics of the ...
Yanzhi Ren, Mooi Choo Chuah, Jie Yang, Yingying Ch...
ICSM
2007
IEEE
14 years 3 months ago
Fault Detection Probability Analysis for Coverage-Based Test Suite Reduction
Test suite reduction seeks to reduce the number of test cases in a test suite while retaining a high percentage of the original suite’s fault detection effectiveness. Most appro...
Scott McMaster, Atif M. Memon
SSS
2007
Springer
130views Control Systems» more  SSS 2007»
14 years 3 months ago
Secure Failure Detection in TrustedPals
We present a modular redesign of TrustedPals, a smartcard-based security framework for solving secure multiparty computation (SMC)[?]. TrustedPals allows to reduce SMC to the probl...
Roberto Cortiñas, Felix C. Freiling, Marjan...
AIR
2004
91views more  AIR 2004»
13 years 9 months ago
A Personalized Defection Detection and Prevention Procedure based on the Self-Organizing Map and Association Rule Mining: Applie
Abstract. Customer retention is an increasingly pressing issue in today's competitive environment. This paper proposes a personalized defection detection and prevention proced...
Hee Seok Song, Jae Kyeong Kim, Yeong Bin Cho, Soun...
CORR
2010
Springer
130views Education» more  CORR 2010»
13 years 7 months ago
Spectral methods for the detection of network community structure: a comparative analysis
Spectral analysis has been successfully applied to the detection of community structure of networks, respectively being based on the adjacency matrix, the standard Laplacian matrix...
Hua-Wei Shen, Xue-Qi Cheng