Sciweavers

12194 search results - page 58 / 2439
» cans 2010
Sort
View
TELSYS
2010
132views more  TELSYS 2010»
13 years 3 months ago
Defending the weakest link: phishing websites detection by analysing user behaviours
Phishing detection systems are principally based on the analysis of data moving from phishers to victims. In this paper we describe a novel approach for detecting phishing websites...
Xun Dong, John A. Clark, Jeremy L. Jacob
ICDE
2010
IEEE
180views Database» more  ICDE 2010»
13 years 9 months ago
Adaptive indexing for relational keys
: © Adaptive indexing for relational keys Goetz Graefe, Harumi Kuno HP Laboratories HPL-2010-23 databases, indexes, storage systems, B-trees, adaptive merging, database cracking A...
Goetz Graefe, Harumi A. Kuno
IPMU
2010
Springer
13 years 7 months ago
Addressing Complexity in a Privacy Expert System
:  Simple Mode: Addressing Knowledge Engineering Complexity in a Privacy Expert System Siani Pearson HP Laboratories HPL-2010-75 privacy, decision support, usability, knowledge ...
Siani Pearson
IJIIDS
2010
136views more  IJIIDS 2010»
13 years 3 months ago
Kleisli category and database mappings
Abstract. This paper presents the semantics of database mappings in the relational database (DB) category, based on the power-view monad T and monadic algebras. The semantics can b...
Zoran Majkic, Bhanu Prasad
JUCS
2010
151views more  JUCS 2010»
13 years 3 months ago
A Semantic Wiki Framework for Reconciling Conflict Collaborations Based on Selecting Consensus Choice
: Semantic wikis have been regarded as an important collaboration tool among a number of experts from multiple domains. This wiki platform can play a role of collaborative knowledg...
Dosam Hwang, Ngoc Thanh Nguyen, Jason J. Jung, Abo...