Sciweavers

1111 search results - page 115 / 223
» Understanding Egocentric Activities
Sort
View
ECRA
2007
116views more  ECRA 2007»
15 years 4 months ago
Two-level workload characterization of online auctions
Online auctions are rapidly becoming one of the significant forms of electronic commerce for buying and selling goods and services. A good understanding of the workload of auctio...
Vasudeva Akula, Daniel A. Menascé
NETWORK
2008
94views more  NETWORK 2008»
15 years 4 months ago
Detecting compromised routers via packet forwarding behavior
While it is widely understood that criminal miscreants are subverting large numbers of Internet-connected computers (e.g., for bots, spyware, SPAM forwarding), it is less well app...
Alper Tugay Mizrak, Stefan Savage, Keith Marzullo
FTIR
2007
119views more  FTIR 2007»
15 years 4 months ago
Opinion Mining and Sentiment Analysis
An important part of our information-gathering behavior has always been to find out what other people think. With the growing availability and popularity of opinion-rich resource...
Bo Pang, Lillian Lee
PERVASIVE
2006
Springer
15 years 4 months ago
Modeling Human Behavior from Simple Sensors in the Home
Pervasive sensors in the home have a variety of applications including energy minimization, activity monitoring for elders, and tutors for household tasks such as cooking. Many of ...
Ryan Aipperspach, Elliot Cohen, John F. Canny
VIROLOGY
2008
68views more  VIROLOGY 2008»
15 years 4 months ago
Internet attacks monitoring with dynamic connection redirection mechanisms
High-interaction honeypots are interesting as they help understand how attacks unfold on a compromised machine. However, observations are generally limited to the operations perfo...
Eric Alata, Ion Alberdi, Vincent Nicomette, Philip...