Sciweavers

956 search results - page 104 / 192
» Data Mining Techniques for Security of Web Services
Sort
View
CCS
2011
ACM
13 years 10 months ago
Cloak and dagger: dynamics of web search cloaking
Cloaking is a common “bait-and-switch” technique used to hide the true nature of a Web site by delivering blatantly different semantic content to different user segments. It i...
David Y. Wang, Stefan Savage, Geoffrey M. Voelker
WSCG
2003
161views more  WSCG 2003»
14 years 11 months ago
A Visualization-based Approach to Explore Geographic Metadata
The paper presents a visualization-based approach to explore large databases of geographic metadata. The aim of the data exploration is to search and acquire expressive geographic...
Riccardo Albertoni, Alessio Bertone, Monica De Mar...
HICSS
2003
IEEE
156views Biometrics» more  HICSS 2003»
15 years 3 months ago
Developing Video Services for Mobile Users
Video information, image processing and computer vision techniques are developing rapidly nowadays because of the availability of acquisition, processing and editing tools, which ...
Mohamed Ahmed, Roger Impey, Ahmed Karmouch
AINA
2010
IEEE
15 years 3 months ago
Encoding and Compression for the Devices Profile for Web Services
—Most solutions for Wireless Sensor Networks (WSN) come equipped with their own architectural concepts which raise the problem of possible incompatibility of computer networks an...
Guido Moritz, Dirk Timmermann, Regina Stoll, Frank...
KDD
2006
ACM
172views Data Mining» more  KDD 2006»
15 years 10 months ago
Attack detection in time series for recommender systems
Recent research has identified significant vulnerabilities in recommender systems. Shilling attacks, in which attackers introduce biased ratings in order to influence future recom...
Sheng Zhang, Amit Chakrabarti, James Ford, Fillia ...