Sciweavers

186 search results - page 25 / 38
» Secure Association Rule Sharing
Sort
View
ICWS
2009
IEEE
14 years 4 months ago
Deactivation of Unwelcomed Deep Web Extraction Services through Random Injection
Websites serve content both through Web Services as well as through user-viewable webpages. While the consumers of web-services are typically ‘machines’, webpages are meant fo...
Varun Bhagwan, Tyrone Grandison
IMSCCS
2007
IEEE
14 years 1 months ago
Linear Correlation Analysis of Numeric Attributes for Government Data
To analyze the linear correlations of numeric attributes of government data, this paper proposes a method based on the clustering algorithm. A clustering method is adopted to prun...
Ying Chen, Guochang Gu, Tian-yang Lv, Shaobin Huan...
IJNSEC
2010
112views more  IJNSEC 2010»
13 years 2 months ago
Detecting Connection-Chains: A Data Mining Approach
A connection-chain refers to a mechanism in which someone recursively logs into a host, then from there logs into another host, and so on. Connection-chains represent an important...
Ahmad Almulhem, Issa Traoré
SP
2003
IEEE
14 years 20 days ago
Hardening Functions for Large Scale Distributed Computations
Many recent large-scale distributed computing applications utilize spare processor cycles of personal computers that are connected to the Internet. The resulting distributed compu...
Doug Szajda, Barry G. Lawson, Jason Owen
OTM
2005
Springer
14 years 27 days ago
An Ontology- and Resources-Based Approach to Evolution and Reactivity in the Semantic Web
Abstract. The Web of today can be seen as an active and heterogeneous infrastructure of autonomous systems, where reactivity, evolution and propagation of information and changes p...
Wolfgang May, José Júlio Alferes, Ri...