Sciweavers

3667 search results - page 662 / 734
» Software Rejuvenation - Modeling and Analysis
Sort
View
CLEF
2009
Springer
13 years 6 months ago
Overview of the CLEF 2009 Medical Image Annotation Track
This paper describe the last round of the medical image annotation task in ImageCLEF 2009. After four years, we defined the task as a survey of all the past experience. Seven grou...
Tatiana Tommasi, Barbara Caputo, Petra Welter, Mar...
DMIN
2009
180views Data Mining» more  DMIN 2009»
13 years 6 months ago
APHID: A Practical Architecture for High-Performance, Privacy-Preserving Data Mining
While the emerging field of privacy preserving data mining (PPDM) will enable many new data mining applications, it suffers from several practical difficulties. PPDM algorithms are...
Jimmy Secretan, Anna Koufakou, Michael Georgiopoul...
ICC
2009
IEEE
13 years 6 months ago
Simulation of SPIT Filtering: Quantitative Evaluation of Parameter Tuning
A future where Internet Telephony will constitute a target valuable to attack is not so unrealistic. E-mail spam botnets software can be updated to send voice spam (commonly referr...
Federico Menna, Renato Lo Cigno, Saverio Niccolini...
IFIPTM
2009
119views Management» more  IFIPTM 2009»
13 years 6 months ago
Detection and Prevention of Insider Threats in Database Driven Web Services
In this paper, we take the first step to address the gap between the security needs in outsourced hosting services and the protection provided in the current practice. We consider ...
Tzvi Chumash, Danfeng Yao
CIKM
2010
Springer
13 years 5 months ago
Crawling the web for structured documents
Structured Information Retrieval is gaining a lot of interest in recent years, as this kind of information is becoming an invaluable asset for professional communities such as Sof...
Julián Urbano, Juan Loréns, Yorgos A...