Sciweavers

1737 search results - page 342 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
TVCG
2008
122views more  TVCG 2008»
13 years 9 months ago
Interactive Entity Resolution in Relational Data: A Visual Analytic Tool and Its Evaluation
Databases often contain uncertain and imprecise references to real-world entities. Entity resolution, which is the process of reconciling multiple references to underlying real-wor...
Hyunmo Kang, Lise Getoor, Ben Shneiderman, Mustafa...
PAIRING
2010
Springer
155views Cryptology» more  PAIRING 2010»
13 years 6 months ago
Identification of Multiple Invalid Pairing-Based Signatures in Constrained Batches
Abstract. This paper describes a new method in pairing-based signature schemes for identifying the invalid digital signatures in a batch after batch verification has failed. The me...
Brian J. Matt
CCECE
2006
IEEE
14 years 3 months ago
A QoS Mapping Rule Builder
Although many QoS management architectures have been recently introduced with a lot of advanced features, they have never been widely used in the existing applications due to the ...
Kim Khoa Nguyen, Brigitte Kerhervé, Brigitt...
CIKM
2005
Springer
14 years 2 months ago
Focused crawling for both topical relevance and quality of medical information
Subject-specific search facilities on health sites are usually built using manual inclusion and exclusion rules. These can be expensive to maintain and often provide incomplete c...
Thanh Tin Tang, David Hawking, Nick Craswell, Kath...
ICDM
2008
IEEE
141views Data Mining» more  ICDM 2008»
14 years 3 months ago
Scalable Tensor Decompositions for Multi-aspect Data Mining
Modern applications such as Internet traffic, telecommunication records, and large-scale social networks generate massive amounts of data with multiple aspects and high dimensiona...
Tamara G. Kolda, Jimeng Sun