Sciweavers

6530 search results - page 913 / 1306
» Application Integration
Sort
View
IEEEARES
2008
IEEE
15 years 11 months ago
Intensive Programme on Information and Communication Security
IT Security is a problem that can only be addressed and taught holistically. Just as broad as the field of ICT itself, IT Security is an integral part of all network and software ...
Christian Schläger, Ludwig Fuchs, Günthe...
ICECCS
2005
IEEE
236views Hardware» more  ICECCS 2005»
15 years 10 months ago
Detecting Malicious JavaScript Code in Mozilla
The JavaScript language is used to enhance the clientside display of web pages. JavaScript code is downloaded into browsers and executed on-the-fly by an embedded interpreter. Br...
Oystein Hallaraker, Giovanni Vigna
KDD
2004
ACM
159views Data Mining» more  KDD 2004»
15 years 10 months ago
Optimal randomization for privacy preserving data mining
Randomization is an economical and efficient approach for privacy preserving data mining (PPDM). In order to guarantee the performance of data mining and the protection of individ...
Michael Yu Zhu, Lei Liu
OTM
2004
Springer
15 years 10 months ago
Revising and Managing Multiple Ontology Versions in a Possible Worlds Setting
Abstract. To date, ontology research seems to have come to an equilibrium: there is a wide variety of theories, methods and tools for extracting, representing, storing and browsing...
Pieter De Leenheer
WMCSA
2003
IEEE
15 years 10 months ago
Real-world Implementation of the Location Stack: The Universal Location Framework
Both the research community and developers in industry have identified the need for a clearly defined vocabulary and programming framework for location technologies. A layered Loc...
David Graumann, Jeffrey Hightower, Walter Lara, Ga...