Sciweavers

280 search results - page 48 / 56
» Vulnerability Discovery Modeling Using Weibull Distribution
Sort
View
WSDM
2010
ACM
214views Data Mining» more  WSDM 2010»
14 years 5 months ago
Pairwise Interaction Tensor Factorization for Personalized Tag Recommendation
Tagging plays an important role in many recent websites. Recommender systems can help to suggest a user the tags he might want to use for tagging a specific item. Factorization mo...
Steffen Rendle, Lars Schmidt-Thieme
MIDDLEWARE
2007
Springer
14 years 1 months ago
Domain-based context management for dynamic and evolutionary environments
Research in context-aware computing has produced a number of application prototypes, frameworks, middlewares and models for describing context. However, development of ubiquitous ...
Ricardo Couto Antunes da Rocha, Markus Endler
SASN
2005
ACM
14 years 1 months ago
On the security of group communication schemes based on symmetric key cryptosystems
Many emerging applications in both wired and wireless networks, such as information dissemination and distributed collaboration in an adversarial environment, need support of secu...
Shouhuai Xu
JSW
2007
185views more  JSW 2007»
13 years 7 months ago
A Decision Support System base line Flexible Architecture to Intrusion Detection
—Becoming more competitive and more effective in the current scenes of Business and Public Administration, the organizations must be able to approach easily and quickly to the in...
Marcello Castellano, Giuseppe Mastronardi, Angela ...
DILS
2005
Springer
14 years 1 months ago
Information Integration and Knowledge Acquisition from Semantically Heterogeneous Biological Data Sources
Abstract. We present INDUS (Intelligent Data Understanding System), a federated, query-centric system for knowledge acquisition from autonomous, distributed, semantically heterogen...
Doina Caragea, Jyotishman Pathak, Jie Bao, Adrian ...