Sciweavers

3651 search results - page 677 / 731
» Data Mining for Security Applications
Sort
View
128
Voted
ICEIS
2000
IEEE
15 years 5 months ago
Architectural Considerations with Distributed Computing
We understand distributed systems as a collection of distributed computation resources that work together as one harmonious system. It is the great achievement of computer network...
Yibing Wang, Robert M. Hyatt, Barrett R. Bryant
124
Voted
IASTEDSEA
2004
15 years 2 months ago
Higher-order strategic programming: A road to software assurance
Program transformation through the repeated application of simple rewrite rules is conducive to formal verification. In practice, program transformation oftentimes requires data t...
Victor L. Winter, Steve Roach, Fares Fraij
CORR
2010
Springer
119views Education» more  CORR 2010»
15 years 25 days ago
Report on the XBase Project
This project addressed the conceptual fundamentals of data storage, investigating techniques for provision of highly generic storage facilities that can be tailored to produce var...
Evangelos Zirintsis, Graham N. C. Kirby, Alan Dear...
190
Voted
GIS
2008
ACM
16 years 1 months ago
Qualitative geocoding of persistent web pages
Information and specifically Web pages may be organized, indexed, searched, and navigated using various metadata aspects, such as keywords, categories (themes), and also space. Wh...
Albert Angel, Chara Lontou, Dieter Pfoser, Alexand...
85
Voted
SAC
2005
ACM
15 years 6 months ago
Automatic extraction of informative blocks from webpages
Search engines crawl and index webpages depending upon their informative content. However, webpages — especially dynamically generated ones — contain items that cannot be clas...
Sandip Debnath, Prasenjit Mitra, C. Lee Giles