Sciweavers

157 search results - page 29 / 32
» Automatically Labeling the Inputs and Outputs of Web Service...
Sort
View
CORR
2010
Springer
92views Education» more  CORR 2010»
14 years 10 months ago
Network Intrusion Detection Using FP Tree Rules
----------------------------------------------ABSTRACT-------------------------------------------In the faceless world of the Internet, online fraud is one of the greatest reasons ...
P. Srinivasulu, J. Ranga Rao, I. Ramesh Babu
VLDB
2008
ACM
170views Database» more  VLDB 2008»
15 years 11 months ago
A multi-ranker model for adaptive XML searching
The evolution of computing technology suggests that it has become more feasible to offer access to Web information in a ubiquitous way, through various kinds of interaction device...
Ho Lam Lau, Wilfred Ng
KBSE
2005
IEEE
15 years 5 months ago
AMNESIA: analysis and monitoring for NEutralizing SQL-injection attacks
The use of web applications has become increasingly popular in our routine activities, such as reading the news, paying bills, and shopping on-line. As the availability of these s...
William G. J. Halfond, Alessandro Orso
JCDL
2004
ACM
125views Education» more  JCDL 2004»
15 years 5 months ago
Generating fuzzy semantic metadata describing spatial relations from images using the R-histogram
Automatic generation of semantic metadata describing spatial relations is highly desirable for image digital libraries. Relative spatial relations between objects in an image conv...
Yuhang Wang, Fillia Makedon, James Ford, Li Shen, ...
WSC
2000
15 years 28 days ago
3D visualization of simulated construction operations
Significant advances have been made in the field of construction process modeling. However, no convenient graphical support tools exist that can depict the modeled operations in 3...
Vineet R. Kamat, Julio C. Martínez