Sciweavers

604 search results - page 51 / 121
» An Evaluation of the Java-Based Approaches to Web Database A...
Sort
View
ICWE
2005
Springer
14 years 1 months ago
Automatic Optimization of Web Recommendations Using Feedback and Ontology Graphs
Abstract. Web recommendation systems have become a popular means to improve the usability of web sites. This paper describes the architecture of a rulebased recommendation system a...
Nick Golovin, Erhard Rahm
ICICS
2005
Springer
14 years 1 months ago
Remotely Keyed Cryptographics Secure Remote Display Access Using (Mostly) Untrusted Hardware
Software that covertly monitors a user’s actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and remov...
Debra L. Cook, Ricardo A. Baratto, Angelos D. Kero...
ICDE
1999
IEEE
107views Database» more  ICDE 1999»
14 years 9 months ago
Using Codewords to Protect Database Data from a Class of Software Errors
Increasingly, for extensibility and performance, specialpurpose application code is being integrated with database system code. Such application code has direct access to database...
Philip Bohannon, Rajeev Rastogi, S. Seshadri, Abra...
WWW
2006
ACM
14 years 8 months ago
GIO: a semantic web application using the information grid framework
It is well understood that the key for successful Semantic Web applications depends on the availability of machine understandable meta-data. We describe the Information Grid, a pr...
Omar Alonso, Sandeepan Banerjee, Mark Drake
CCR
2008
76views more  CCR 2008»
13 years 7 months ago
WebClass: adding rigor to manual labeling of traffic anomalies
Despite the flurry of anomaly-detection papers in recent years, effective ways to validate and compare proposed solutions have remained elusive. We argue that evaluating anomaly d...
Haakon Ringberg, Augustin Soule, Jennifer Rexford