Sciweavers

956 search results - page 178 / 192
» Data Mining Techniques for Security of Web Services
Sort
View
TVCG
2002
132views more  TVCG 2002»
13 years 7 months ago
Hierarchical Pixel Bar Charts
Simple presentation graphics are intuitive and easy-to-use, but only show highly aggregated data. Bar charts, for example, only show a rather small number of data values and x-y-pl...
Daniel A. Keim, Ming C. Hao, Umeshwar Dayal
ICDE
2006
IEEE
159views Database» more  ICDE 2006»
14 years 1 months ago
Replication Based on Objects Load under a Content Distribution Network
Users tend to use the Internet for “resource-hungry” applications (which involve content such as video, audio on-demand and distributed data) and at the same time, more and mo...
George Pallis, Konstantinos Stamos, Athena Vakali,...
TRUST
2010
Springer
14 years 13 days ago
Beyond Kernel-Level Integrity Measurement: Enabling Remote Attestation for the Android Platform
Abstract. Increasing adoption of smartphones in recent times has begun to attract more and more malware writers towards these devices. Among the most prominent and widely adopted o...
Mohammad Nauman, Sohail Khan, Xinwen Zhang, Jean-P...
VLDB
2001
ACM
100views Database» more  VLDB 2001»
13 years 11 months ago
Improving Business Process Quality through Exception Understanding, Prediction, and Prevention
Business process automation technologies are being increasingly used by many companies to improve the efficiency of both internal processes as well as of e-services offered to cus...
Daniela Grigori, Fabio Casati, Umeshwar Dayal, Min...
DSN
2007
IEEE
13 years 11 months ago
A Real-Time Network Traffic Profiling System
This paper presents the design and implementation of a real-time behavior profiling system for high-speed Internet links. The profiling system uses flow-level information from con...
Kuai Xu, Feng Wang 0002, Supratik Bhattacharyya, Z...