Sciweavers

956 search results - page 64 / 192
» Data Mining Techniques for Security of Web Services
Sort
View
PPAM
2005
Springer
15 years 3 months ago
Grids for Real Time Data Applications
We describe our work in building support for streaming data services for Geographical Information System Grid services. We examine how streaming approaches may be used to increase ...
Geoffrey Fox, Mehmet S. Aktas, Galip Aydin, Hasan ...
DMKD
2004
ACM
133views Data Mining» more  DMKD 2004»
15 years 3 months ago
Mining complex matchings across Web query interfaces
To enable information integration, schema matching is a critical step for discovering semantic correspondences of attributes across heterogeneous sources. As a new attempt, this p...
Bin He, Kevin Chen-Chuan Chang, Jiawei Han
KDD
2004
ACM
164views Data Mining» more  KDD 2004»
15 years 10 months ago
Discovering complex matchings across web query interfaces: a correlation mining approach
To enable information integration, schema matching is a critical step for discovering semantic correspondences of attributes across heterogeneous sources. While complex matchings ...
Bin He, Kevin Chen-Chuan Chang, Jiawei Han
MIDDLEWARE
2007
Springer
15 years 3 months ago
Dynamic multi-process information flow tracking for web application security
Although there is a large body of research on detection and prevention of such memory corruption attacks as buffer overflow, integer overflow, and format string attacks, the web...
Susanta Nanda, Lap-Chung Lam, Tzi-cker Chiueh
JCDL
2009
ACM
102views Education» more  JCDL 2009»
15 years 4 months ago
Unsupervised creation of small world networks for the preservation of digital objects
The prevailing model for digital preservation is that archives should be similar to a “fortress”: a large, protective infrastructure built to defend a relatively small collect...
Charles L. Cartledge, Michael L. Nelson