Sciweavers

758 search results - page 49 / 152
» User Control over User Adaptation: A Case Study
Sort
View
100
Voted
CEAS
2006
Springer
15 years 7 months ago
Dynamic Port 25 Blocking to Control SPAM Zombies
This paper presents the results of a case study in which outbound SPAM, here referring to excessive amounts of bulk-generated email, is suppressed using dynamic Port 25 blocking. ...
Jonathan Schmidt
SIGMOD
2007
ACM
178views Database» more  SIGMOD 2007»
16 years 3 months ago
Quality is in the eye of the beholder: towards user-centric web-databases
The proliferation of database-driven web sites (or web-databases) has brought upon a plethora of applications where both Quality of Service (QoS) and Quality of Data (QoD) are of ...
Huiming Qu, Jie Xu, Alexandros Labrinidis
WISTP
2010
Springer
15 years 10 months ago
Fraud Detection for Voice over IP Services on Next-Generation Networks
The deployment of Next-Generation Networks (NGN) is a challenge that requires integrating heterogeneous services into a global system of All-IP telecommunications. These networks c...
Igor Ruiz-Agundez, Yoseba K. Penya, Pablo Garcia B...
PKDD
2004
Springer
118views Data Mining» more  PKDD 2004»
15 years 9 months ago
Mining Thick Skylines over Large Databases
Abstract. People recently are interested in a new operator, called skyline [3], which returns the objects that are not dominated by any other objects with regard to certain measure...
Wen Jin, Jiawei Han, Martin Ester
POLICY
2009
Springer
15 years 10 months ago
Towards Session-Aware RBAC Administration and Enforcement with XACML
Abstract—An administrative role-based access control (ARBAC) model specifies administrative policies over a role-based access control (RBAC) system, where an administrative perm...
Min Xu, Duminda Wijesekera, Xinwen Zhang, Deshan C...