Sciweavers

250 search results - page 24 / 50
» Understanding user behavior in large-scale video-on-demand s...
Sort
View
RAID
2010
Springer
13 years 6 months ago
Bait Your Hook: A Novel Detection Technique for Keyloggers
Software keyloggers are a fast growing class of malware often used to harvest confidential information. One of the main reasons for this rapid growth is the possibility for unpriv...
Stefano Ortolani, Cristiano Giuffrida, Bruno Crisp...
CCGRID
2008
IEEE
13 years 9 months ago
A Probabilistic Model to Analyse Workflow Performance on Production Grids
Production grids are complex and highly variable systems whose behavior is not well understood and difficult to anticipate. The goal of this study is to estimate the impact of the ...
Tristan Glatard, Johan Montagnat, Xavier Pennec
COMCOM
2008
112views more  COMCOM 2008»
13 years 7 months ago
A game-theoretic analysis of wireless access point selection by mobile users
A user located in a congested area of a wireless LAN may benefit by moving to a less-crowded area and using a less-loaded access point. This idea has gained attention from research...
Kimaya Mittal, Elizabeth M. Belding, Subhash Suri
INTERACT
2003
13 years 9 months ago
Confidence Displays and Training in Recommender Systems
: Recommender systems help users sort through vast quantities of information. Sometimes, however, users do not know if they can trust the recommendations they receive. Adding a con...
Sean M. McNee, Shyong K. Lam, Catherine Guetzlaff,...
LOCA
2005
Springer
14 years 1 months ago
Classifying the Mobility of Users and the Popularity of Access Points
Abstract. There is increasing interest in location-aware systems and applications. It is important for any designer of such systems and applications to understand the nature of use...
Minkyong Kim, David Kotz