Sciweavers

157 search results - page 30 / 32
» Detecting semantic cloaking on the web
Sort
View
ICC
2009
IEEE
118views Communications» more  ICC 2009»
14 years 2 months ago
A First Order Logic Security Verification Model for SIP
: It is well known that no security mechanism can provide full protection against a potential attack. There is always a possibility that a security incident may happen, mainly as a...
Dimitris Geneiatakis, Costas Lambrinoudakis, Georg...
IAT
2008
IEEE
14 years 2 months ago
An Ontology-Driven Framework for Deploying JADE Agent Systems
Multi-agent systems have proven to be a powerful technology for building complex distributed applications. However, the process of designing, configuring and deploying agent-based...
Csongor Nyulas, Martin J. O'Connor, Samson W. Tu, ...
IDEAS
1999
IEEE
101views Database» more  IDEAS 1999»
13 years 12 months ago
Integration of Semistructured Data with Partial and Inconsistent Information
Data integration of several sources has gained considerable attentions with the recent popularity of the Web. In the real world, some information may be missing i.e., partial and ...
Mengchi Liu, Tok Wang Ling, Tao Guan
SEMWEB
2010
Springer
13 years 5 months ago
Making Sense of Twitter
Abstract. Twitter enjoys enormous popularity as a micro-blogging service largely due to its simplicity. On the downside, there is little organization to the Twitterverse and making...
David Laniado, Peter Mika
ICC
2009
IEEE
150views Communications» more  ICC 2009»
14 years 2 months ago
Modeling Human Behavior for Defense Against Flash-Crowd Attacks
—Flash-crowd attacks are the most vicious form of distributed denial of service (DDoS). They flood the victim with service requests generated from numerous bots. Attack requests...
Georgios Oikonomou, Jelena Mirkovic