Sciweavers

2236 search results - page 430 / 448
» Intrusion detection techniques and approaches
Sort
View
JSS
2011
103views more  JSS 2011»
12 years 10 months ago
XML-manipulating test case prioritization for XML-manipulating services
: A web service may evolve autonomously, making peer web services in the same service composition uncertain as to whether the evolved behaviors are compatible with its original col...
Lijun Mei, W. K. Chan, T. H. Tse, Robert G. Merkel
PAKDD
2011
ACM
419views Data Mining» more  PAKDD 2011»
12 years 10 months ago
DISC: Data-Intensive Similarity Measure for Categorical Data
Abstract. The concept of similarity is fundamentally important in almost every scientific field. Clustering, distance-based outlier detection, classification, regression and sea...
Aditya Desai, Himanshu Singh, Vikram Pudi
INFOCOM
2012
IEEE
11 years 10 months ago
Location privacy preservation in collaborative spectrum sensing
—Collaborative spectrum sensing has been regarded as a promising approach to enable secondary users to detect primary users by exploiting spatial diversity. In this paper, we con...
Shuai Li, Haojin Zhu, Zhaoyu Gao, Xinping Guan, Ka...
MICCAI
2009
Springer
14 years 9 months ago
Personalized Pulmonary Trunk Modeling for Intervention Planning and Valve Assessment Estimated from CT Data
Pulmonary valve disease affects a significant portion of the global population and often occurs in conjunction with other heart dysfunctions. Emerging interventional methods enable...
Dime Vitanovski, Razvan Ioan Ionasec, Bogdan Geo...
WWW
2006
ACM
14 years 8 months ago
Time-dependent semantic similarity measure of queries using historical click-through data
It has become a promising direction to measure similarity of Web search queries by mining the increasing amount of clickthrough data logged by Web search engines, which record the...
Qiankun Zhao, Steven C. H. Hoi, Tie-Yan Liu, Soura...