Sciweavers

928 search results - page 155 / 186
» Safety management of complex technology
Sort
View
CN
2007
106views more  CN 2007»
13 years 10 months ago
Learning DFA representations of HTTP for protecting web applications
Intrusion detection is a key technology for self-healing systems designed to prevent or manage damage caused by security threats. Protecting web server-based applications using in...
Kenneth L. Ingham, Anil Somayaji, John Burge, Step...
KBS
2008
198views more  KBS 2008»
13 years 10 months ago
Clinical practice guidelines: A case study of combining OWL-S, OWL, and SWRL
As the number of available Web services increases there is a growing demand to realise complex business processes by combining and reusing available Web services. In this context,...
Mercedes Argüello Casteleiro, Jose Julio Des ...
JOT
2010
117views more  JOT 2010»
13 years 8 months ago
Formal Model and DSL for Separation of Concerns based on Views
The separation of concerns (SOC), as a conceptual tool, enables us to manage the complexity of software systems that we develop. The benefits of this paradigm, such as reuse, enhan...
Mehdi Adda, Hamid Mcheick, Hafedh Mili
CIKM
2009
Springer
14 years 4 months ago
Using domain ontology for semantic web usage mining and next page prediction
This paper proposes the integration of semantic information drawn from a web application’s domain knowledge into all phases of the web usage mining process (preprocessing, patte...
Nizar R. Mabroukeh, Christie I. Ezeife
ISW
2009
Springer
14 years 4 months ago
Structural Attacks on Two SHA-3 Candidates: Blender-n and DCH-n
The recently started SHA-3 competition in order to find a new secure hash standard and thus a replacement for SHA-1/SHA-2 has attracted a lot of interest in the academic world as ...
Mario Lamberger, Florian Mendel