Sciweavers

10021 search results - page 1667 / 2005
» Adaptive information extraction
Sort
View
ICDM
2007
IEEE
135views Data Mining» more  ICDM 2007»
15 years 10 months ago
Private Inference Control for Aggregate Database Queries
Data security is a critical issue for many organizations. Sensitive data must be protected from both inside and outside attackers. Access control policies and related mechanisms h...
Geetha Jagannathan, Rebecca N. Wright
DRM
2007
Springer
15 years 10 months ago
Mechanism for software tamper resistance: an application of white-box cryptography
In software protection we typically have to deal with the white-box attack model. In this model an attacker is assumed to have full access to the software and full control over it...
Wil Michiels, Paul Gorissen
ESWS
2007
Springer
15 years 10 months ago
Intelligent Search in a Collection of Video Lectures
ct In recent years, the use of streamed digital video as a teaching and learning resource has become an increasingly attractive option for many educators as an innovation which exp...
Angela Fogarolli
BIBE
2006
IEEE
184views Bioinformatics» more  BIBE 2006»
15 years 10 months ago
A Language Modeling Text Mining Approach to the Annotation of Protein Community
This paper discusses an ontology based language modeling text mining approach to the annotation of protein community. Communities appear to play an important role in the functional...
Xiaodan Zhang, Daniel Duanqing Wu, Xiaohua Zhou, X...
GIR
2006
ACM
15 years 10 months ago
Detecting Geographical Serving Area of Web Resources
Most human activities occur around where the user is physically located. Knowing the geographical serving area of web resources, therefore, is very important for many web applicat...
Qi Zhang, Xing Xie, Lee Wang, Lihua Yue, Wei-Ying ...
« Prev « First page 1667 / 2005 Last » Next »