Sciweavers

12 search results - page 2 / 3
» On a Classification Approach for SOA Vulnerabilities
Sort
View
ICPR
2006
IEEE
14 years 5 months ago
Combining Generative and Discriminative Methods for Pixel Classification with Multi-Conditional Learning
It is possible to broadly characterize two approaches to probabilistic modeling in terms of generative and discriminative methods. Provided with sufficient training data the discr...
B. Michael Kelm, Chris Pal, Andrew McCallum
KDD
2006
ACM
170views Data Mining» more  KDD 2006»
14 years 5 months ago
Classification features for attack detection in collaborative recommender systems
Collaborative recommender systems are highly vulnerable to attack. Attackers can use automated means to inject a large number of biased profiles into such a system, resulting in r...
Robin D. Burke, Bamshad Mobasher, Chad Williams, R...
TES
2005
Springer
13 years 10 months ago
Ad-UDDI: An Active and Distributed Service Registry
In SOA (Service Oriented Architecture), web service providers use service registries to publish services and requestors use registries to find them. The major current service regis...
Zongxia Du, Jinpeng Huai, Yunhao Liu
EICS
2010
ACM
13 years 9 months ago
User interface plasticity: model driven engineering to the limit!
Ten years ago, I introduced the notion of user interface plasticity to denote the capacity of user interfaces to adapt, or to be adapted, to the context of use while preserving us...
Joëlle Coutaz
ICDE
2009
IEEE
156views Database» more  ICDE 2009»
14 years 6 months ago
Online Anomaly Prediction for Robust Cluster Systems
In this paper, we present a stream-based mining algorithm for online anomaly prediction. Many real-world applications such as data stream analysis requires continuous cluster opera...
Xiaohui Gu, Haixun Wang