Sciweavers

2988 search results - page 458 / 598
» Interacting with Web Hierarchies
Sort
View
IEEEARES
2008
IEEE
14 years 3 months ago
Evaluation of Anomaly Based Character Distribution Models in the Detection of SQL Injection Attacks
The ubiquity of web applications has led to an increased focus on the development of attacks targeting these applications. One particular type of attack that has recently become p...
Mehdi Kiani, Andrew Clark, George M. Mohay
AH
2008
Springer
14 years 3 months ago
A Scrutable User Modelling Infrastructure for Enabling Life-Long User Modelling
User Modelling is the core component for the majority of personalisation systems. By keeping a model for every user, a system can successfully personalise its content and utilise a...
Demetris Kyriacou
EDOC
2007
IEEE
14 years 3 months ago
Publishing of Interoperable Services and Processes in UDDI
— This paper presents a requirements analysis and a solution approach to representing workflow processes conforming to the Wf-XML/ASAP standard proposal in a UDDI registry. Wf-X...
Marcus Spies, Harald Schöning, Keith Swenson
ICDM
2007
IEEE
101views Data Mining» more  ICDM 2007»
14 years 3 months ago
Lightweight Distributed Trust Propagation
Using mobile devices, such as smart phones, people may create and distribute different types of digital content (e.g., photos, videos). One of the problems is that digital content...
Daniele Quercia, Stephen Hailes, Licia Capra
SAINT
2007
IEEE
14 years 3 months ago
SPICE: Evolving IMS to Next Generation Service Platforms
Today's wireless and mobile services are typically monolithic and often centralized in nature, which limits heterogeneous service access and shared service usage. New sources...
Sasu Tarkoma, Christian Prehofer, Anna V. Zhdanova...