Sciweavers

1097 search results - page 184 / 220
» Sequential Object Monitors
Sort
View
ADBIS
2006
Springer
135views Database» more  ADBIS 2006»
15 years 6 months ago
Interactive Discovery and Composition of Complex Web Services
Among the most important expected benefits of a global service oriented architecture leveraging web service standards is an increased level of automation in the discovery, composit...
Sergey A. Stupnikov, Leonid A. Kalinichenko, St&ea...
AUSDM
2006
Springer
112views Data Mining» more  AUSDM 2006»
15 years 6 months ago
The Scamseek Project - Text Mining for Financial Scams on the Internet
The Scamseek project, as commissioned by ASIC has the principal objective of building an industrially viable system that retrieves potential scam candidate documents from the Inte...
Jon Patrick
134
Voted
FDL
2004
IEEE
15 years 6 months ago
UML System-Level Analysis and Design of Secure Communication Schemes for Embedded Systems
In this work we develop a secure communication protocol in the context of a Remote Meter Reading (RMR) System. We first analyze existing standards in secure communication (e.g. IP...
Mauro Prevostini, Giuseppe Piscopo, I. Stefanini
DSN
2006
IEEE
15 years 6 months ago
Using Attack Injection to Discover New Vulnerabilities
Due to our increasing reliance on computer systems, security incidents and their causes are important problems that need to be addressed. To contribute to this objective, the pape...
Nuno Ferreira Neves, João Antunes, Miguel C...
EWCBR
2006
Springer
15 years 6 months ago
Supplementing Case-based Recommenders with Context Data
Abstract. We propose that traditional case-based recommender systems can be improved by informing them with context data describing the user's environment. We outline existing...
Lorcan Coyle, Evelyn Balfe, Graeme Stevenson, Stev...