Sciweavers

956 search results - page 174 / 192
» Data Mining Techniques for Security of Web Services
Sort
View
MM
2004
ACM
130views Multimedia» more  MM 2004»
15 years 3 months ago
An approach to interactive media system for mobile devices
The interactive system which interacts human with computer has been recognized as one direction of computer development for a long time. For example, in cinema, a person gets info...
Eun-Seok Ryu, Chuck Yoo
DASFAA
2004
IEEE
135views Database» more  DASFAA 2004»
15 years 1 months ago
Semi-supervised Text Classification Using Partitioned EM
Text classification using a small labeled set and a large unlabeled data is seen as a promising technique to reduce the labor-intensive and time consuming effort of labeling traini...
Gao Cong, Wee Sun Lee, Haoran Wu, Bing Liu
79
Voted
IEEECIT
2009
IEEE
15 years 4 months ago
A Highly Efficient Inter-domain Communication Channel
—With virtual machine technology, distributed services deployed in multiple cooperative virtual machines, such as multi-tier web services, may reside on one physical machine. Thi...
Hongyong Zang, Kuiyan Gu, Yaqiong Li, Yuzhong Sun,...
93
Voted
BPM
2006
Springer
113views Business» more  BPM 2006»
15 years 1 months ago
Process Equivalence: Comparing Two Process Models Based on Observed Behavior
In various application domains there is a desire to compare process models, e.g., to relate an organization-specific process model to a reference model, to find a web service match...
Wil M. P. van der Aalst, Ana Karla A. de Medeiros,...
SP
2008
IEEE
144views Security Privacy» more  SP 2008»
15 years 4 months ago
Cloaker: Hardware Supported Rootkit Concealment
Rootkits are used by malicious attackers who desire to run software on a compromised machine without being detected. They have become stealthier over the years as a consequence of...
Francis M. David, Ellick Chan, Jeffrey C. Carlyle,...