Sciweavers

956 search results - page 156 / 192
» Data Mining Techniques for Security of Web Services
Sort
View
AVI
2008
14 years 11 months ago
Query-through-drilldown: data-oriented extensional queries
Traditional database query formulation is intensional: at the level of schemas, table and column names. Previous work has shown that filters can be created using a query paradigm ...
Alan J. Dix, Damon Oram
ICSOC
2004
Springer
15 years 3 months ago
Flexible coordination of service interaction patterns
Service-oriented computing is meant to support loose relationships between organisations: Collaboration procedures on the application-level translate to interaction processes via ...
Christian Zirpins, Winfried Lamersdorf, Toby Baier
109
Voted
CVPR
2009
IEEE
16 years 4 months ago
Tour the World: building a web-scale landmark recognition engine
Modeling and recognizing landmarks at world-scale is a useful yet challenging task. There exists no readily available list of worldwide landmarks. Obtaining reliable visual mode...
Yantao Zheng, Ming Zhao 0003, Yang Song, Hartwig A...
WSDM
2010
ACM
213views Data Mining» more  WSDM 2010»
15 years 7 months ago
Corroborating Information from Disagreeing Views
We consider a set of views stating possibly conflicting facts. Negative facts in the views may come, e.g., from functional dependencies in the underlying database schema. We want ...
Alban Galland, Serge Abiteboul, Amélie Mari...
WWW
2004
ACM
15 years 10 months ago
Edgecomputing: extending enterprise applications to the edge of the internet
Content delivery networks have evolved beyond traditional distributed caching. With services such as Akamai's EdgeComputing it is now possible to deploy and run enterprise bu...
Andy Davis, Jay Parikh, William E. Weihl