Sciweavers

956 search results - page 91 / 192
» Data Mining Techniques for Security of Web Services
Sort
View
CASCON
2010
187views Education» more  CASCON 2010»
14 years 8 months ago
A Framework for Automatically Supporting End-Users in Service Composition
In Service Oriented Architecture (SOA), service composition integrates existing services to fulfill specific tasks using a set of standards and tools. However, current service comp...
Hua Xiao, Ying Zou, Ran Tang, Joanna Ng, Leho Nigu...
HIS
2009
14 years 7 months ago
Ontology-Supported Web Recommender for Scholar Information
In this quickly developed and shifting era of Internet, how to make use of webpage indexing structure or search engines which let information demanders fast and precisely search a...
Sheng-Yuan Yang, Chun-Liang Hsu
GRID
2005
Springer
15 years 3 months ago
SERVOGrid complexity computational environments (CCE) integrated performance analysis
In this paper we describe the architecture and initial performance analysis results of the SERVOGrid Complexity Computational Environments (CCE). The CCE architecture is based on ...
Galip Aydin, Mehmet S. Aktas, Geoffrey Fox, Harsha...
BPM
2006
Springer
149views Business» more  BPM 2006»
14 years 12 months ago
Verifying BPEL Workflows Under Authorisation Constraints
Abstract. Business Process Execution Language (BPEL), or Web Services BPEL (WS-BPEL), is the standard for specifying workflow process definition using web services. Research on for...
Zhao Xiangpeng, Antonio Cerone, Padmanabhan Krishn...
SDM
2007
SIAM
130views Data Mining» more  SDM 2007»
14 years 11 months ago
Towards Attack-Resilient Geometric Data Perturbation
Data perturbation is a popular technique for privacypreserving data mining. The major challenge of data perturbation is balancing privacy protection and data quality, which are no...
Keke Chen, Gordon Sun, Ling Liu