107
click to vote
ISMIS
15 years 2 months ago
2005 Springer
Abstract. Testing of database applications is of great importance. Although various studies have been conducted to investigate testing techniques for database design, relatively fe...
ISMIS
15 years 2 months ago
2005 Springer
Abstract. We present an overview of anomaly detection used in computer security, and provide a detailed example of a host-based Intrusion Detection System that monitors file syste...
ISMIS
15 years 2 months ago
2005 Springer
One of the main issues inWeb usage mining is the discovery of patterns in the navigational behavior of Web users. Standard approaches, such as clustering of users’sessions and di...
73
Voted
ISMIS
15 years 2 months ago
2005 Springer
The notion of rules is very popular and appears in different flavors, for example as association rules in data mining or as functional (or multivalued) dependencies in databases. ...
ISMIS
15 years 2 months ago
2005 Springer
Intelligent information processing systems, such as digital libraries or search engines index web-pages according to their informative content. However, web-pages contain several n...
|