Sciweavers

2817 search results - page 546 / 564
» A Framework for the Management of Information Security
Sort
View
SIGMOD
2008
ACM
101views Database» more  SIGMOD 2008»
14 years 8 months ago
Pay-as-you-go user feedback for dataspace systems
A primary challenge to large-scale data integration is creating semantic equivalences between elements from different data sources that correspond to the same real-world entity or...
Shawn R. Jeffery, Michael J. Franklin, Alon Y. Hal...
KESAMSTA
2009
Springer
14 years 1 months ago
Structural Changes in an Email-Based Social Network
ent Artificial Immune Systems (MAAIS) for Intrusion Detection: Abstraction from Danger Theory Chung-Ming Ou, C.R. Ou Ants-like Agents: a Model and Analysis Based on Natural Ants Be...
Krzysztof Juszczyszyn, Katarzyna Musial
SPIESR
2003
230views Database» more  SPIESR 2003»
13 years 10 months ago
Bridging the semantic gap in sports
One of the major challenges facing current media management systems and related applications is the so-called ‘‘semantic gap’’ between the rich meaning that a user desires...
Baoxin Li, James H. Errico, Hao Pan, M. Ibrahim Se...
KDD
2006
ACM
155views Data Mining» more  KDD 2006»
14 years 9 months ago
Camouflaged fraud detection in domains with complex relationships
We describe a data mining system to detect frauds that are camouflaged to look like normal activities in domains with high number of known relationships. Examples include accounti...
Sankar Virdhagriswaran, Gordon Dakin
SIGMOD
2007
ACM
188views Database» more  SIGMOD 2007»
14 years 8 months ago
Keyword search on relational data streams
Increasing monitoring of transactions, environmental parameters, homeland security, RFID chips and interactions of online users rapidly establishes new data sources and applicatio...
Alexander Markowetz, Yin Yang, Dimitris Papadias