Sciweavers

1035 search results - page 199 / 207
» Patterns Approach to Building Software Systems
Sort
View
CCS
2008
ACM
13 years 11 months ago
A practical mimicry attack against powerful system-call monitors
System-call monitoring has become the basis for many hostbased intrusion detection as well as policy enforcement techniques. Mimicry attacks attempt to evade system-call monitorin...
Chetan Parampalli, R. Sekar, Rob Johnson
BMCBI
2005
112views more  BMCBI 2005»
13 years 9 months ago
Web services and workflow management for biological resources
Backgorund: The completion of the Human Genome Project has resulted in large quantities of biological data which are proving difficult to manage and integrate effectively. There i...
Paolo Romano 0001, Domenico Marra, Luciano Milanes...
CONEXT
2009
ACM
13 years 10 months ago
StarClique: guaranteeing user privacy in social networks against intersection attacks
Building on the popularity of online social networks (OSNs) such as Facebook, social content-sharing applications allow users to form communities around shared interests. Millions...
Krishna P. N. Puttaswamy, Alessandra Sala, Ben Y. ...
CORR
2007
Springer
151views Education» more  CORR 2007»
13 years 9 months ago
Decision tree modeling with relational views
Data mining is a useful decision support technique that can be used to discover production rules in warehouses or corporate data. Data mining research has made much effort to appl...
Fadila Bentayeb, Jérôme Darmont
KDD
2008
ACM
199views Data Mining» more  KDD 2008»
14 years 9 months ago
Efficient computation of personal aggregate queries on blogs
There is an exploding amount of user-generated content on the Web due to the emergence of "Web 2.0" services, such as Blogger, MySpace, Flickr, and del.icio.us. The part...
Ka Cheung Sia, Junghoo Cho, Yun Chi, Belle L. Tsen...