Sciweavers

3086 search results - page 412 / 618
» Developing Secure Web Applications
Sort
View
ISI
2008
Springer
15 years 2 months ago
Analysis of cyberactivism: A case study of online free Tibet activities
In this paper, we study the problem of anomaly detection in high-dimensional network streams. We have developed a new technique, called Stream Projected Ouliter deTector (SPOT), t...
Tianjun Fu, Hsinchun Chen
104
Voted
CSI
2007
91views more  CSI 2007»
15 years 2 months ago
Implementing regular cash with blind fixed-value electronic coins
We propose a generic framework for the development of an off-line peer-to-peer electronic payment system with fixed-value electronic coins. The proposed scheme simulates the issua...
Dimitrios Lekkas, Diomidis Spinellis
ISI
2008
Springer
15 years 29 days ago
Anomaly detection in high-dimensional network data streams: A case study
In this paper, we study the problem of anomaly detection in high-dimensional network streams. We have developed a new technique, called Stream Projected Ouliter deTector (SPOT), t...
Ji Zhang, Qigang Gao, Hai H. Wang
115
Voted
SAC
2010
ACM
15 years 9 months ago
Web-based graphical querying of databases through an ontology: the Wonder system
Biological scientists have made large amounts of data available on the Web, which can be accessed by canned or precomputed queries presented via web forms. To satisfy further info...
Diego Calvanese, C. Maria Keet, Werner Nutt, Maria...
CORR
2010
Springer
208views Education» more  CORR 2010»
15 years 2 months ago
Discovering potential user browsing behaviors using custom-built apriori algorithm
Most of the organizations put information on the web because they want it to be seen by the world. Their goal is to have visitors come to the site, feel comfortable and stay a whi...
Sandeep Singh Rawat, Lakshmi Rajamani