Sciweavers

1544 search results - page 282 / 309
» Data Mining and Database Systems: Where is the Intersection
Sort
View
CCS
2007
ACM
14 years 2 months ago
Predicting vulnerable software components
Where do most vulnerabilities occur in software? Our Vulture tool automatically mines existing vulnerability databases and version archives to map past vulnerabilities to componen...
Stephan Neuhaus, Thomas Zimmermann, Christian Holl...
SIGUCCS
2000
ACM
14 years 1 months ago
Remedial Help Desk 101 at Florida State University
The User Services division of the Office of Technology Integration is the "safety net" for computer support at Florida State University (FSU). Areas of support include t...
Diana Orrick, Jeff Bauer, Ernest McDuffie
IAT
2003
IEEE
14 years 1 months ago
Classification Rule Discovery with Ant Colony Optimization
—Ant-based algorithms or ant colony optimization (ACO) algorithms have been applied successfully to combinatorial optimization problems. More recently, Parpinelli and colleagues ...
Bo Liu, Hussein A. Abbass, Bob McKay
SIGMOD
2003
ACM
124views Database» more  SIGMOD 2003»
14 years 8 months ago
Dynamic XML documents with distribution and replication
The advent of XML as a universal exchange format, and of Web services as a basis for distributed computing, has fostered the apparition of a new class of documents: dynamic XML do...
Serge Abiteboul, Angela Bonifati, Gregory Cobena, ...
ICDE
2002
IEEE
136views Database» more  ICDE 2002»
14 years 10 months ago
Mixing Querying and Navigation in MIX
Web-based information systems provide to their users the ability to interleave querying and browsing during their information discovery efforts. The MIX system provides an API cal...
Pratik Mukhopadhyay, Yannis Papakonstantinou