Sciweavers

956 search results - page 136 / 192
» Data Mining Techniques for Security of Web Services
Sort
View
KDD
2007
ACM
566views Data Mining» more  KDD 2007»
15 years 10 months ago
IMDS: intelligent malware detection system
The proliferation of malware has presented a serious threat to the security of computer systems. Traditional signature-based antivirus systems fail to detect polymorphic and new, ...
Yanfang Ye, Dingding Wang, Tao Li, Dongyi Ye
SAC
2005
ACM
15 years 3 months ago
SVD-based collaborative filtering with privacy
Collaborative ï¬ltering (CF) techniques are becoming increasingly popular with the evolution of the Internet. Such techniques recommend products to customers using similar usersâ...
Huseyin Polat, Wenliang Du
DBSEC
2007
128views Database» more  DBSEC 2007»
14 years 11 months ago
gVault: A Gmail Based Cryptographic Network File System
Abstract. In this paper, we present the design of gVault, a cryptographic network ï¬le system that utilizes the data storage provided by Gmail’s web-based email service. Such a ...
Ravi Chandra Jammalamadaka, Roberto Gamboni, Shara...
IAT
2003
IEEE
15 years 3 months ago
Person Name Identification in Chinese Documents Using Finite State Automata
This research is about automatic identification and extraction of person names in Chinese text documents. Solutions to this problem have immediate and extensive applications in ma...
Bing Shen, Zhongfei (Mark) Zhang, Chunfa Yuan
ICWS
2010
IEEE
14 years 8 months ago
Enhancing Scalability and Performance of Mashups Through Merging and Operator Reordering
Abstract—Recently, mashups are gaining tremendous popularity as an important Web 2.0 application. Mashups provide end-users with an opportunity to create personalized Web service...
Osama Al-Haj Hassan, Lakshmish Ramaswamy, John A. ...