Sciweavers

956 search results - page 45 / 192
» Data Mining Techniques for Security of Web Services
Sort
View
WWW
2008
ACM
14 years 9 months ago
Composing and optimizing data providing web services
In this paper, we propose a new approach to automatically compose data providing Web services. Our approach exploits existing mature works done in data integration systems. Specif...
Mahmoud Barhamgi, Djamal Benslimane, Aris M. Oukse...
ISI
2005
Springer
14 years 2 months ago
Private Mining of Association Rules
This paper introduces a new approach to a problem of data sharing among multiple parties, without disclosing the data between the parties. Our focus is data sharing among two parti...
Justin Z. Zhan, Stan Matwin, LiWu Chang
ISI
2005
Springer
14 years 2 months ago
Collecting and Analyzing the Presence of Terrorists on the Web: A Case Study of Jihad Websites
Abstract. The Internet which has enabled global businesses to flourish has become the very same channel for mushrooming ‘terrorist news networks.’ Terrorist organizations and t...
Edna Reid, Jialun Qin, Yilu Zhou, Guanpi Lai, Marc...
ICSM
2005
IEEE
14 years 2 months ago
An Empirical Comparison of Test Suite Reduction Techniques for User-Session-Based Testing of Web Applications
Automated cost-effective test strategies are needed to provide reliable, secure, and usable web applications. As a software maintainer updates an application, test cases must accu...
Sara Sprenkle, Sreedevi Sampath, Emily Gibson, Lor...
ADMA
2008
Springer
186views Data Mining» more  ADMA 2008»
14 years 2 months ago
A Distributed Privacy-Preserving Association Rules Mining Scheme Using Frequent-Pattern Tree
Association rules mining is a frequently used technique which finds interesting association and correlation relationships among large set of data items which occur frequently toge...
Chunhua Su, Kouichi Sakurai