Sciweavers

359 search results - page 44 / 72
» Supporting Real World Security Models in Java
Sort
View
KDD
2002
ACM
182views Data Mining» more  KDD 2002»
16 years 2 months ago
On the need for time series data mining benchmarks: a survey and empirical demonstration
In the last decade there has been an explosion of interest in mining time series data. Literally hundreds of papers have introduced new algorithms to index, classify, cluster and s...
Eamonn J. Keogh, Shruti Kasetty
139
Voted
WWW
2005
ACM
16 years 3 months ago
Middleware services for web service compositions
WS-* specifications cover a variety of issues ranging from security and reliability to transaction support in web services. However, these specifications do not address web servic...
Anis Charfi, Mira Mezini
131
Voted
CORR
2004
Springer
146views Education» more  CORR 2004»
15 years 2 months ago
ANTIDS: Self-Organized Ant-based Clustering Model for Intrusion Detection System
: Security of computers and the networks that connect them is increasingly becoming of great significance. Computer security is defined as the protection of computing systems again...
Vitorino Ramos, Ajith Abraham
OOPSLA
1987
Springer
15 years 5 months ago
Metaclasses are First Class: the ObjVlisp Model
This paper shows how an attempt at a uniform and reflective definition resulted in an open-ended system supporting ObjVlisp, which we use to simulate object-oriented language exte...
Pierre Cointe
ISM
2005
IEEE
109views Multimedia» more  ISM 2005»
15 years 8 months ago
A Trust Model for Ubiquitous Systems based on Vectors of Trust Values
Ubiquitous Computing foresees a massively networked world supporting a population of diverse but cooperating mobile devices where trust relationships between entities are uncertai...
Hassan Jameel, Hung Le Xuan, Umar Kalim, Ali Sajja...