Sciweavers

956 search results - page 42 / 192
» Data Mining Techniques for Security of Web Services
Sort
View
SIGMOD
2010
ACM
305views Database» more  SIGMOD 2010»
14 years 1 months ago
MoveMine: mining moving object databases
With the maturity of GPS, wireless, and Web technologies, increasing amounts of movement data collected from various moving objects, such as animals, vehicles, mobile devices, and...
Zhenhui Li, Ming Ji, Jae-Gil Lee, Lu An Tang, Yint...
DMIN
2008
158views Data Mining» more  DMIN 2008»
13 years 10 months ago
Mining User Movement Behavior Patterns in a Mobile Service Environment
Abstract - The rapid advances of wireless and web technologies enable the mobile users to request various kinds of services via mobile devices at anytime and anywhere. To provide t...
Yen-Ssu Chou, Tzung-Shi Chen
ICC
2009
IEEE
118views Communications» more  ICC 2009»
14 years 3 months ago
A First Order Logic Security Verification Model for SIP
: It is well known that no security mechanism can provide full protection against a potential attack. There is always a possibility that a security incident may happen, mainly as a...
Dimitris Geneiatakis, Costas Lambrinoudakis, Georg...
WAIM
2004
Springer
14 years 1 months ago
Mining Web Sequential Patterns Incrementally with Revised PLWAP Tree
Since point and click at web pages generate continuous data stream, which flow into web log data, old patterns may be stale and need to be updated. Algorithms for mining web seque...
Christie I. Ezeife, Min Chen
SIGMOD
2008
ACM
210views Database» more  SIGMOD 2008»
14 years 8 months ago
Private queries in location based services: anonymizers are not necessary
Mobile devices equipped with positioning capabilities (e.g., GPS) can ask location-dependent queries to Location Based Services (LBS). To protect privacy, the user location must n...
Gabriel Ghinita, Panos Kalnis, Ali Khoshgozaran, C...