Sciweavers

956 search results - page 131 / 192
» Data Mining Techniques for Security of Web Services
Sort
View
SAC
2010
ACM
15 years 4 months ago
CAPTCHA smuggling: hijacking web browsing sessions to create CAPTCHA farms
CAPTCHAs protect online resources and services from automated access. From an attacker’s point of view, they are typically perceived as an annoyance that prevents the mass creat...
Manuel Egele, Leyla Bilge, Engin Kirda, Christophe...
WWW
2010
ACM
15 years 4 months ago
Keyword extraction for social snippets
Today, a huge amount of text is being generated for social purposes on social networking services on the Web. Unlike traditional documents, such text is usually extremely short an...
Zhenhui Li, Ding Zhou, Yun-Fang Juan, Jiawei Han
ICWS
2004
IEEE
14 years 11 months ago
Realizability of Conversation Protocols With Message Contents
A conversation protocol is a top-down specification framework which specifies desired global behaviors of a web service composition. In our earlier work [6] we studied the problem...
Xiang Fu, Tevfik Bultan, Jianwen Su
ICWS
2010
IEEE
14 years 8 months ago
Towards Improved Data Dissemination of Publish-Subscribe Systems
—with the proliferation of internet technologies, publish/subscribe systems have gained wide usage as a middleware. However for this model, catering large number of publishers an...
Ramith Jayasinghe, Dinesh Gamage, Srinath Perera
NAR
2007
111views more  NAR 2007»
14 years 9 months ago
PEDANT genome database: 10 years online
The PEDANT genome database provides exhaustive annotation of 468 genomes by a broad set of bioinformatics algorithms. We describe recent developments of the PEDANT Web server. The...
M. Louise Riley, Thorsten Schmidt, Irena I. Artamo...