Sciweavers

275 search results - page 27 / 55
» Trust Evaluation for Web Applications based on Behavioral An...
Sort
View
LAWEB
2005
IEEE
14 years 2 months ago
Optimized Index Structures for Querying RDF from the Web
Storing and querying Resource Description Framework (RDF) data is one of the basic tasks within any Semantic Web application. A number of storage systems provide assistance for th...
Andreas Harth, Stefan Decker
CONEXT
2006
ACM
14 years 22 days ago
Early application identification
The automatic detection of applications associated with network traffic is an essential step for network security and traffic engineering. Unfortunately, simple port-based classif...
Laurent Bernaille, Renata Teixeira, Kavé Sa...
NTMS
2008
IEEE
14 years 3 months ago
Time and Location Based Services with Access Control
—We propose an access control model that extends RBAC (Role-Based Access Control) to take time and location into account, and use term rewriting systems to specify access control...
Clara Bertolissi, Maribel Fernández
WWW
2002
ACM
14 years 9 months ago
A machine learning based approach for table detection on the web
Table is a commonly used presentation scheme, especially for describing relational information. However, table understanding remains an open problem. In this paper, we consider th...
Yalin Wang, Jianying Hu
SEMCO
2008
IEEE
14 years 3 months ago
Applications of Voting Theory to Information Mashups
Blogs, discussion forums and social networking sites are an excellent source for people’s opinions on a wide range of topics. We examine the application of voting theory to “I...
Alfredo Alba, Varun Bhagwan, Julia Grace, Daniel G...