Sciweavers

625 search results - page 102 / 125
» Problems of music information retrieval in the real world
Sort
View
COMAD
2008
13 years 9 months ago
Towards the Preservation of Keys in XML Data Transformation for Integration
Transformation of a source schema with its conforming data to a target schema with its conforming data is an important activity in XML as two schemas in XML can represent same rea...
Md. Sumon Shahriar
IAJIT
2010
96views more  IAJIT 2010»
13 years 6 months ago
DDoS Incidents and their Impact: A Review
: The phenomenal growth and success of Internet has changed the way traditional essential services such as banking, transportation, medicine, education and defence are operated. No...
Monika Sachdeva, Gurvinder Singh, Krishan Kumar, K...
ICC
2009
IEEE
125views Communications» more  ICC 2009»
13 years 5 months ago
HMM-Web: A Framework for the Detection of Attacks Against Web Applications
Nowadays, the web-based architecture is the most frequently used for a wide range of internet services, as it allows to easily access and manage information and software on remote ...
Igino Corona, Davide Ariu, Giorgio Giacinto
KDD
2012
ACM
178views Data Mining» more  KDD 2012»
11 years 10 months ago
Mining event periodicity from incomplete observations
Advanced technology in GPS and sensors enables us to track physical events, such as human movements and facility usage. Periodicity analysis from the recorded data is an important...
Zhenhui Li, Jingjing Wang, Jiawei Han
SSDBM
2007
IEEE
105views Database» more  SSDBM 2007»
14 years 1 months ago
Maintaining K-Anonymity against Incremental Updates
K-anonymity is a simple yet practical mechanism to protect privacy against attacks of re-identifying individuals by joining multiple public data sources. All existing methods achi...
Jian Pei, Jian Xu, Zhibin Wang, Wei Wang 0009, Ke ...