Sciweavers

1477 search results - page 227 / 296
» What's the point of documentation
Sort
View
RAID
2010
Springer
13 years 6 months ago
A Data-Centric Approach to Insider Attack Detection in Database Systems
The insider threat against database management systems is a dangerous security problem. Authorized users may abuse legitimate privileges to masquerade as other users or to maliciou...
Sunu Mathew, Michalis Petropoulos, Hung Q. Ngo, Sh...
SIAMJO
2010
84views more  SIAMJO 2010»
13 years 6 months ago
A Redistributed Proximal Bundle Method for Nonconvex Optimization
Proximal bundle methods have been shown to be highly successful optimization methods for unconstrained convex problems with discontinuous first derivatives. This naturally leads ...
Warren Hare, Claudia A. Sagastizábal
TON
2010
122views more  TON 2010»
13 years 6 months ago
The (in)completeness of the observed internet AS-level structure
— Despite significant efforts to obtain an accurate picture of the Internet’s connectivity structure at the level of individual autonomous systems (ASes), much has remained un...
Ricardo V. Oliveira, Dan Pei, Walter Willinger, Be...
EMNLP
2010
13 years 6 months ago
Exploiting Conversation Structure in Unsupervised Topic Segmentation for Emails
This work concerns automatic topic segmentation of email conversations. We present a corpus of email threads manually annotated with topics, and evaluate annotator reliability. To...
Shafiq R. Joty, Giuseppe Carenini, Gabriel Murray,...
EVOW
2010
Springer
13 years 6 months ago
Coevolutionary Dynamics of Interacting Species
One of the open questions in evolutionary computation is how an arms race may be initiated between coevolving entities such that the entities acquire new behaviors and increase in ...
Marc Ebner, Richard A. Watson, Jason Alexander