In this paper, we present a framework for the design of steganographic schemes that can provide provable security by achieving zero Kullback-Leibler divergence between the cover a...
In the paper we present a new approach based on application of neural networks to detect SQL attacks. SQL attacks are those attacks that take advantage of using SQL statements to ...
Essentially all data mining algorithms assume that the datagenerating process is independent of the data miner's activities. However, in many domains, including spam detectio...
Nilesh N. Dalvi, Pedro Domingos, Mausam, Sumit K. ...
In this paper, we present the AgreementMaker, an ontology alignment tool that incorporates the Descendants Similarity Inheritance (DSI) method. This method uses the structure of th...
Although many QoS management architectures have been recently introduced with a lot of advanced features, they have never been widely used in the existing applications due to the ...