Sciweavers

415 search results - page 64 / 83
» Identifying web spam with user behavior analysis
Sort
View
COMPSAC
2010
IEEE
13 years 6 months ago
Representing and Reasoning about Web Access Control Policies
The advent of emerging technologies such as Web services, service-oriented architecture, and cloud computing has enabled us to perform business services more efficiently and effect...
Gail-Joon Ahn, Hongxin Hu, Joohyung Lee, Yunsong M...
SACMAT
2011
ACM
12 years 11 months ago
Anomaly discovery and resolution in web access control policies
The advent of emerging technologies such as Web services, serviceoriented architecture, and cloud computing has enabled us to perform business services more efficiently and effec...
Hongxin Hu, Gail-Joon Ahn, Ketan Kulkarni
BMCBI
2010
92views more  BMCBI 2010»
13 years 8 months ago
HORI: a web server to compute Higher Order Residue Interactions in protein structures
Background: Folding of a protein into its three dimensional structure is influenced by both local and global interactions within a protein. Higher order residue interactions, like...
Pandurangan Sundaramurthy, Khader Shameer, Raashi ...
AAAI
2006
13 years 10 months ago
Using an Ontology for Knowledge Acquisition
We describe an approach to distributed knowledge acquisition using an ontology. The ontology is used to represent and reason about soldier performance. These methods are embedded ...
Stacy Lovell, Webb Stacy
WWW
2008
ACM
14 years 9 months ago
Tag-based social interest discovery
The success and popularity of social network systems, such as del.icio.us, Facebook, MySpace, and YouTube, have generated many interesting and challenging problems to the research...
Xin Li, Lei Guo, Yihong Eric Zhao