Sciweavers

749 search results - page 138 / 150
» The ethical nature of critical research in information syste...
Sort
View
ATAL
2006
Springer
13 years 11 months ago
Deploying a personalized time management agent
We report on our ongoing practical experience in designing, implementing, and deploying PTIME, a personalized agent for time management and meeting scheduling in an open, multi-ag...
Pauline Berry, Bart Peintner, Ken Conley, Melinda ...
ACMDIS
2010
ACM
13 years 7 months ago
The CLOTHO project: predicting application utility
When using the computer, each user has some notion that "these applications are important" at a given point in time. We term this subset of applications that the user va...
Joshua M. Hailpern, Nicholas Jitkoff, Joseph Subid...
TMA
2010
Springer
166views Management» more  TMA 2010»
14 years 2 months ago
Understanding and Preparing for DNS Evolution
The Domain Name System (DNS) is a crucial component of today’s Internet. The top layer of the DNS hierarchy (the root nameservers) is facing dramatic changes: cryptographically s...
Sebastian Castro, Min Zhang, Wolfgang John, Duane ...
CCS
2007
ACM
14 years 1 months ago
Network anomaly detection based on TCM-KNN algorithm
Intrusion detection is a critical component of secure information systems. Network anomaly detection has been an active and difficult research topic in the field of Intrusion Dete...
Yang Li, Binxing Fang, Li Guo, You Chen
SIGMETRICS
2008
ACM
135views Hardware» more  SIGMETRICS 2008»
13 years 7 months ago
In search of the elusive ground truth: the internet's as-level connectivity structure
Despite significant efforts to obtain an accurate picture of the Internet's actual connectivity structure at the level of individual autonomous systems (ASes), much has remai...
Ricardo V. Oliveira, Dan Pei, Walter Willinger, Be...