Sciweavers

1186 search results - page 34 / 238
» A New Approach to Secure Logging
Sort
View
JCIT
2008
165views more  JCIT 2008»
13 years 8 months ago
Mining Processes using cluster approach for representing workflows
Although much attention is being paid to business Intelligence during the past decades, the design for applying business Intelligence and particularly in a workflow processes is s...
N. P. Kavya, M. V. Sathyanarayana, N. C. Naveen

Publication
148views
13 years 10 months ago
ADSandbox: sandboxing JavaScript to fight malicious websites
We present ADSandbox, an analysis system for malicious websites that focusses on detecting attacks through JavaScript. Since, in contrast to Java, JavaScript does not have any bui...
EMNLP
2007
13 years 10 months ago
Improving Query Spelling Correction Using Web Search Results
Traditional research on spelling correction in natural language processing and information retrieval literature mostly relies on pre-defined lexicons to detect spelling errors. Bu...
Qing Chen, Mu Li, Ming Zhou
CSREASAM
2009
13 years 9 months ago
Security Level Determination Using Branes for Contextual Based Global Processing: An Architecture
This paper presents the basics of a new paradigm that allows generators and consumers of global contextual information to determine an appropriate security level needed for contex...
Greg Vert, Evangelos Triantaphyllou
SSS
2009
Springer
163views Control Systems» more  SSS 2009»
14 years 3 months ago
Developing Autonomic and Secure Virtual Organisations with Chemical Programming
This paper studies the development of autonomic and secure Virtual Organisations (VOs) when following the chemical-programming paradigm. We have selected the Higher-Order Chemical ...
Alvaro E. Arenas, Jean-Pierre Banâtre, Thier...