Sciweavers

956 search results - page 27 / 192
» Data Mining Techniques for Security of Web Services
Sort
View
STORAGESS
2005
ACM
14 years 2 months ago
The evolution of storage service providers: techniques and challenges to outsourcing storage
As enterprise storage needs grow, it is challenging to manage storage systems. The costs of locally managing, supporting, and maintaining resilience in storage systems has skyrock...
Ragib Hasan, William Yurcik, Suvda Myagmar
ICPP
2006
IEEE
14 years 2 months ago
A PROactive Request Distribution (PRORD) Using Web Log Mining in a Cluster-Based Web Server
Widely adopted distributor-based systems forward user requests to a balanced set of waiting servers in complete transparency to the users. The policy employed in forwarding reques...
Heung Ki Lee, Gopinath Vageesan, Ki Hwan Yum, Eun ...
DGO
2003
202views Education» more  DGO 2003»
13 years 9 months ago
Crime Data Mining: An Overview and Case Studies
The concern about national security has increased significantly since the 9/11 attacks. However, information overload hinders the effective analysis of criminal and terrorist activ...
Hsinchun Chen, Wingyan Chung, Yi Qin, Michael Chau...
COMAD
2008
13 years 10 months ago
CUM: An Efficient Framework for Mining Concept Units
Web is the most important repository of different kinds of media such as text, sound, video, images etc. Web mining is the process of applying data mining techniques to automatica...
Santhi Thilagam
SAC
2004
ACM
14 years 1 months ago
Unsupervised learning techniques for an intrusion detection system
With the continuous evolution of the types of attacks against computer networks, traditional intrusion detection systems, based on pattern matching and static signatures, are incr...
Stefano Zanero, Sergio M. Savaresi