Sciweavers

802 search results - page 40 / 161
» Data-Sharing Relationships in the Web
Sort
View
JASIS
2008
76views more  JASIS 2008»
13 years 8 months ago
Using importance flooding to identify interesting networks of criminal activity
Abstract. In spite of policy concerns and high costs, the law enforcement community is investing heavily in data sharing initiatives. Cross-jurisdictional criminal justice informat...
Byron Marshall, Hsinchun Chen, Siddharth Kaza
EEE
2005
IEEE
14 years 2 months ago
On Comprehensive Contractual Descriptions of Web Services
Comprehensive contractual description of Web Services and Web Service compositions is needed for selection of appropriate Web Services and their service and quality of service (Qo...
Vladimir Tosic, Bernard Pagurek
RAID
2007
Springer
14 years 2 months ago
Swaddler: An Approach for the Anomaly-Based Detection of State Violations in Web Applications
In recent years, web applications have become tremendously popular, and nowadays they are routinely used in security-critical environments, such as medical, financial, and milita...
Marco Cova, Davide Balzarotti, Viktoria Felmetsger...
SIGMOD
2008
ACM
214views Database» more  SIGMOD 2008»
14 years 9 months ago
A graph method for keyword-based selection of the top-K databases
While database management systems offer a comprehensive solution to data storage, they require deep knowledge of the schema, as well as the data manipulation language, in order to...
Quang Hieu Vu, Beng Chin Ooi, Dimitris Papadias, A...
WWW
2007
ACM
14 years 9 months ago
Construction by linking: the linkbase method
The success of many innovative Web applications is not based on the content they produce ? but on how they combine and link existing content. Older Web Engineering methods lack fl...
Johannes Meinecke, Frederic Majer, Martin Gaedke