Sciweavers

5435 search results - page 159 / 1087
» Informed Detection Revisited
Sort
View
AWIC
2011
Springer
14 years 8 months ago
Enabling Product Comparisons on Unstructured Information Using Ontology Matching
Information extraction approaches are heavily used to gather product information on the Web, especially focusing on technical product specifications. If requesting different sour...
Maximilian Walther, Niels Jäckel, Daniel Schu...
138
Voted
ICSE
2007
IEEE-ACM
16 years 4 months ago
The CRUTIAL Architecture for Critical Information Infrastructures
Abstract. In this chapter we discuss the susceptibility of critical information infrastructures to computer-borne attacks and faults, mainly due to their largely computerized natur...
Paulo Veríssimo, Nuno Ferreira Neves, Migue...
IEEEIAS
2008
IEEE
15 years 11 months ago
Information Assurance in Critical Infrastructures via Wireless Sensor Networks
Information assurance in critical infrastructure is an issue that has been addressed generally focusing on real-time or quasi real-time monitoring of the critical infrastructure; ...
Michele Albano, Stefano Chessa, Roberto Di Pietro
ITCC
2005
IEEE
15 years 10 months ago
Elimination of Redundant Information for Web Data Mining
These days, billions of Web pages are created with HTML or other markup languages. They only have a few uniform structures and contain various authoring styles compared to traditi...
Shakirah Mohd Taib, Soon-ja Yeom, Byeong Ho Kang
CCS
2010
ACM
15 years 4 months ago
An empirical study of privacy-violating information flows in JavaScript web applications
The dynamic nature of JavaScript web applications has given rise to the possibility of privacy violating information flows. We present an empirical study of the prevalence of such...
Dongseok Jang, Ranjit Jhala, Sorin Lerner, Hovav S...