Sciweavers

1508 search results - page 181 / 302
» Efficient Path Profiling
Sort
View
WWW
2008
ACM
14 years 10 months ago
Web user de-identification in personalization
It is a kind of privacy infraction in personalized web service if the user profile submitted to one web site transferred to another site without user permission. That can cause th...
Jiaqian Zheng, Jing Yao, Junyu Niu
CICLING
2009
Springer
14 years 10 months ago
Business Specific Online Information Extraction from German Websites
This paper presents a system that uses the domain name of a German business website to locate its information pages (e.g. company profile, contact page, imprint) and then identifi...
Yeong Su Lee, Michaela Geierhos
KDD
2002
ACM
144views Data Mining» more  KDD 2002»
14 years 10 months ago
ADMIT: anomaly-based data mining for intrusions
Security of computer systems is essential to their acceptance and utility. Computer security analysts use intrusion detection systems to assist them in maintaining computer system...
Karlton Sequeira, Mohammed Javeed Zaki
VLSID
2005
IEEE
167views VLSI» more  VLSID 2005»
14 years 10 months ago
A Methodology and Tooling Enabling Application Specific Processor Design
This paper presents a highly efficient processor design methodology based on the LISA 2.0 language. Typically the architecture design phase is dominated by an iterative processor ...
Andreas Hoffmann, Frank Fiedler, Achim Nohl, Suren...
ICDE
2010
IEEE
243views Database» more  ICDE 2010»
14 years 9 months ago
Probabilistic Contextual Skylines
The skyline query returns the most interesting tuples according to a set of explicitly defined preferences among attribute values. This work relaxes this requirement, and allows us...
Anastasios Arvanitis, Dimitris Sacharidis, Timos K...