Sciweavers

1990 search results - page 242 / 398
» services 2010
Sort
View
CORR
2010
Springer
212views Education» more  CORR 2010»
15 years 4 months ago
Cryptanalysis of a more efficient and secure dynamic id-based remote user authentication scheme
In 2004, Das, Saxena and Gulati proposed a dynamic ID-based remote user authentication scheme which has many advantage such as no verifier table, user freedom to choose and change...
Mohammed Aijaz Ahmed, D. Rajya Lakshmi, Sayed Abdu...
CORR
2010
Springer
140views Education» more  CORR 2010»
15 years 4 months ago
Performance Evaluation of DCA and SRC on a Single Bot Detection
: Malicious users try to compromise systems using new techniques. One of the recent techniques used by the attacker is to perform complex distributed attacks such as denial of serv...
Yousof Al-Hammadi, Uwe Aickelin, Julie Greensmith
123
Voted
CORR
2010
Springer
109views Education» more  CORR 2010»
15 years 4 months ago
An Ontology-based Context Aware System for Selective Dissemination of Information in a Digital Library
Users of Institutional Repositories and Digital Libraries are known by their needs for very specific information about one or more subjects. To characterize users profiles and offe...
Marisa R. De Giusti, Gonzalo L. Villarreal, Agust&...
DIS
2010
Springer
15 years 3 months ago
Sentiment Knowledge Discovery in Twitter Streaming Data
Micro-blogs are a challenging new source of information for data mining techniques. Twitter is a micro-blogging service built to discover what is happening at any moment in time, a...
Albert Bifet, Eibe Frank
DMS
2010
155views Multimedia» more  DMS 2010»
15 years 3 months ago
Ontological Filters for Slow Intelligence Systems
: Slow Intelligence Systems are general-purpose systems characterized by being able to improve performance over time through a process involving enumeration, propagation, adaptatio...
Shi-Kuo Chang, Emilio Zegarra, Chia Chun Shih, Tin...