Sciweavers

758 search results - page 49 / 152
» User Control over User Adaptation: A Case Study
Sort
View
CEAS
2006
Springer
14 years 19 days ago
Dynamic Port 25 Blocking to Control SPAM Zombies
This paper presents the results of a case study in which outbound SPAM, here referring to excessive amounts of bulk-generated email, is suppressed using dynamic Port 25 blocking. ...
Jonathan Schmidt
SIGMOD
2007
ACM
178views Database» more  SIGMOD 2007»
14 years 9 months ago
Quality is in the eye of the beholder: towards user-centric web-databases
The proliferation of database-driven web sites (or web-databases) has brought upon a plethora of applications where both Quality of Service (QoS) and Quality of Data (QoD) are of ...
Huiming Qu, Jie Xu, Alexandros Labrinidis
WISTP
2010
Springer
14 years 3 months ago
Fraud Detection for Voice over IP Services on Next-Generation Networks
The deployment of Next-Generation Networks (NGN) is a challenge that requires integrating heterogeneous services into a global system of All-IP telecommunications. These networks c...
Igor Ruiz-Agundez, Yoseba K. Penya, Pablo Garcia B...
PKDD
2004
Springer
118views Data Mining» more  PKDD 2004»
14 years 2 months ago
Mining Thick Skylines over Large Databases
Abstract. People recently are interested in a new operator, called skyline [3], which returns the objects that are not dominated by any other objects with regard to certain measure...
Wen Jin, Jiawei Han, Martin Ester
POLICY
2009
Springer
14 years 3 months ago
Towards Session-Aware RBAC Administration and Enforcement with XACML
Abstract—An administrative role-based access control (ARBAC) model specifies administrative policies over a role-based access control (RBAC) system, where an administrative perm...
Min Xu, Duminda Wijesekera, Xinwen Zhang, Deshan C...