Sciweavers

3901 search results - page 635 / 781
» Grid Computing Using Web Services Technologies
Sort
View
143
Voted
WEBI
2009
Springer
15 years 9 months ago
Data Mining for Malicious Code Detection and Security Applications
: Data mining is the process of posing queries and extracting patterns, often previously unknown from large quantities of data using pattern matching or other reasoning techniques....
Bhavani M. Thuraisingham
ACSAC
2000
IEEE
15 years 6 months ago
Virtual Enterprise Networks: The Next Generation of Secure Enterprise Networking
We present a vision of computing environments in which enterprise networks are built using untrusted public infrastructures. The vision allows for networks to dynamically change d...
Germano Caronni, S. Kumar, Christoph L. Schuba, Gl...
WWW
2004
ACM
16 years 3 months ago
The effect of the back button in a random walk: application for pagerank
Theoretical analysis of the Web graph is often used to improve the efficiency of search engines. The PageRank algorithm, proposed by [5], is used by the Google search engine [4] t...
Fabien Mathieu, Mohamed Bouklit
POPL
1999
ACM
15 years 6 months ago
Typed Memory Management in a Calculus of Capabilities
An increasing number of systems rely on programming language technology to ensure safety and security of low-level code. Unfortunately, these systems typically rely on a complex, ...
Karl Crary, David Walker, J. Gregory Morrisett
121
Voted
CVPR
2006
IEEE
16 years 4 months ago
AnnoSearch: Image Auto-Annotation by Search
Although it has been studied for several years by computer vision and machine learning communities, image annotation is still far from practical. In this paper, we present AnnoSea...
Xin-Jing Wang, Lei Zhang, Feng Jing, Wei-Ying Ma