Sciweavers

3651 search results - page 550 / 731
» Data Mining for Security Applications
Sort
View
CIKM
2009
Springer
15 years 12 months ago
Networks, communities and kronecker products
Emergence of the web and online computing applications gave rise to rich large scale social activity data. One of the principal challenges then is to build models and understandin...
Jure Leskovec
JCDL
2006
ACM
133views Education» more  JCDL 2006»
15 years 11 months ago
Repository software evaluation using the audit checklist for certification of trusted digital repositories
The NDIIPP ECHO DEPository project [1] digital repository evaluation will use an augmented version of the draft Audit Checklist for Certification of Trusted Digital Repositories (...
Joanne Kaczmarek, Thomas G. Habing, Janet Eke
IDEAS
2003
IEEE
102views Database» more  IDEAS 2003»
15 years 10 months ago
Pushing Quality of Service Information and Requirements into Global Query Optimization
In recent years, a lot of research effort has been dedicated to the management of Quality of Service (QoS), mainly in the fields of telecommunication networks and multimedia syste...
Haiwei Ye, Brigitte Kerhervé, Gregor von Bo...
POS
1998
Springer
15 years 9 months ago
DynamO: Dynamic Objects with Persistent Storage
In light of advances in processor and networking technology, especially the emergence of network attached disks, the traditional client-server architecture becomes suboptimal for ...
Jiong Yang, Silvia Nittel, Wei Wang 0010, Richard ...
JUCS
2008
116views more  JUCS 2008»
15 years 5 months ago
A Workflow Language for Web Automation
: Most today's web sources do not provide suitable interfaces for software programs to interact with them. Many researchers have proposed highly effective techniques to addres...
Paula Montoto, Alberto Pan, Juan Raposo, Jos&eacut...