Sciweavers

956 search results - page 133 / 192
» Data Mining Techniques for Security of Web Services
Sort
View
KDD
2008
ACM
153views Data Mining» more  KDD 2008»
15 years 10 months ago
Information extraction from Wikipedia: moving down the long tail
Not only is Wikipedia a comprehensive source of quality information, it has several kinds of internal structure (e.g., relational summaries known as infoboxes), which enable self-...
Fei Wu, Raphael Hoffmann, Daniel S. Weld
CSFW
1995
IEEE
15 years 1 months ago
Implementation of a discretionary access control model for script-based systems
Powerful applications can be implemented using command scripts. A command script is a program written by one user, called a writer, and made available to another user, called the ...
Trent Jaeger, Atul Prakash
SAC
2009
ACM
15 years 2 months ago
An ontology-based application in heart electrophysiology: representation, reasoning and visualization on the web
Computational technologies have been increasingly explored to make biomedical knowledge and data more accessible for human understanding, comparison, analysis and communication. I...
Bernardo Gonçalves, Veruska Zamborlini, Gia...
ACSAC
2002
IEEE
15 years 2 months ago
Composable Tools For Network Discovery and Security Analysis
Security analysis should take advantage of a reliable knowledge base that contains semantically-rich information about a protected network. This knowledge is provided by network m...
Giovanni Vigna, Fredrik Valeur, Jingyu Zhou, Richa...
ICDM
2007
IEEE
140views Data Mining» more  ICDM 2007»
15 years 1 months ago
Sequential Change Detection on Data Streams
Model-based declarative queries are becoming an attractive paradigm for interacting with many data stream applications. This has led to the development of techniques to accurately...
S. Muthukrishnan, Eric van den Berg, Yihua Wu