Sciweavers

311 search results - page 32 / 63
» Criticality analysis of Internet infrastructure
Sort
View
WEBI
2009
Springer
14 years 2 months ago
Data Mining for Malicious Code Detection and Security Applications
: Data mining is the process of posing queries and extracting patterns, often previously unknown from large quantities of data using pattern matching or other reasoning techniques....
Bhavani M. Thuraisingham
SEMWEB
2001
Springer
13 years 12 months ago
Industrial Strength Ontology Management
Ontologies are becoming increasingly prevalent and important in a wide range of e-commerce applications. E-commerce applications are using ontologies to support parametric searches...
Aseem Das, Wei Wu, Deborah L. McGuinness
ECOWS
2009
Springer
13 years 10 months ago
Run-time Verification of Behavioural Conformance for Conversational Web Services
— Web services exposing run-time behaviour that deviates from their behavioural specifications represent a major threat to the sustainability of a service-oriented ecosystem. It ...
Dimitris Dranidis, Ervin Ramollari, Dimitrios Kour...
NGC
2007
Springer
128views Communications» more  NGC 2007»
13 years 7 months ago
User-oriented Security Supporting Inter-disciplinary Life Science Research across the Grid
Abstract Understanding potential genetic factors in disease or development of personalised e-Health solutions require scientists to access a multitude of data and compute resources...
Richard O. Sinnott, Oluwafemi Ajayi, Jipu Jiang, A...
WWW
2008
ACM
14 years 8 months ago
Psst: a web-based system for tracking political statements
Determining candidates' views on important issues is critical in deciding whom to support and vote for; but finding their statements and votes on an issue can be laborious. I...
Samantha Kleinberg, Bud Mishra