Sciweavers

6696 search results - page 1328 / 1340
» Securing social networks
Sort
View
KDD
2006
ACM
155views Data Mining» more  KDD 2006»
14 years 8 months ago
Camouflaged fraud detection in domains with complex relationships
We describe a data mining system to detect frauds that are camouflaged to look like normal activities in domains with high number of known relationships. Examples include accounti...
Sankar Virdhagriswaran, Gordon Dakin
SIGMOD
2002
ACM
142views Database» more  SIGMOD 2002»
14 years 7 months ago
The Grid: An Application of the Semantic Web
The Grid is an emerging platform to support on-demand "virtual organisations" for coordinated resource sharing and problem solving on a global scale. The application thr...
Carole A. Goble, David De Roure
EDBT
2008
ACM
112views Database» more  EDBT 2008»
14 years 7 months ago
Providing freshness guarantees for outsourced databases
Database outsourcing becomes increasingly attractive as advances in network technologies eliminate the perceived performance difference between in-house databases and outsourced d...
Min Xie, Haixun Wang, Jian Yin, Xiaofeng Meng
WSDM
2010
ACM
315views Data Mining» more  WSDM 2010»
14 years 5 months ago
SBotMiner: Large Scale Search Bot Detection
In this paper, we study search bot traffic from search engine query logs at a large scale. Although bots that generate search traffic aggressively can be easily detected, a large ...
Fang Yu, Yinglian Xie, Qifa Ke
IPPS
2009
IEEE
14 years 2 months ago
Input-independent, scalable and fast string matching on the Cray XMT
String searching is at the core of many security and network applications like search engines, intrusion detection systems, virus scanners and spam filters. The growing size of o...
Oreste Villa, Daniel G. Chavarría-Miranda, ...
« Prev « First page 1328 / 1340 Last » Next »