Sciweavers

956 search results - page 103 / 192
» Data Mining Techniques for Security of Web Services
Sort
View
ISSTA
2004
ACM
15 years 3 months ago
Model checking XML manipulating software
The use of XML as the de facto data exchange standard has allowed integration of heterogeneous web based software systems regardless of implementation platforms and programming la...
Xiang Fu, Tevfik Bultan, Jianwen Su
TISSEC
2008
100views more  TISSEC 2008»
14 years 9 months ago
Message Dropping Attacks in Overlay Networks: Attack Detection and Attacker Identification
Overlay multicast networks are used by service providers to distribute contents such as web pages, streaming multimedia data, or security updates to a large number of users. Howeve...
Liang Xie, Sencun Zhu
WWW
2004
ACM
15 years 10 months ago
Analysis of interacting BPEL web services
This paper presents a set of tools and techniques for analyzing interactions of composite web services which are specified in BPEL and communicate through asynchronous XML message...
Xiang Fu, Tevfik Bultan, Jianwen Su
JMS
2006
90views more  JMS 2006»
14 years 10 months ago
Healthcare Informatics Research: From Data to Evidence-Based Management
Healthcare informatics research is a scientific endeavor that applies information science, computer technology, and statistical modeling techniques to develop decision support syst...
Thomas T. H. Wan
ADC
2005
Springer
183views Database» more  ADC 2005»
15 years 3 months ago
Discovering User Access Pattern Based on Probabilistic Latent Factor Model
There has been an increased demand for characterizing user access patterns using web mining techniques since the informative knowledge extracted from web server log files can not ...
Guandong Xu, Yanchun Zhang, Jiangang Ma, Xiaofang ...