Sciweavers

5856 search results - page 829 / 1172
» Developing Query Patterns
Sort
View
122
Voted
DAS
2004
Springer
15 years 8 months ago
A Neural Network Classifier for Junk E-Mail
Abstract. Most e-mail readers spend a non-trivial amount of time regularly deleting junk e-mail (spam) messages, even as an expanding volume of such e-mail occupies server storage ...
Ian Stuart, Sung-Hyuk Cha, Charles C. Tappert
DEXA
2004
Springer
140views Database» more  DEXA 2004»
15 years 8 months ago
Extracting User Behavior by Web Communities Technology on Global Web Logs
A lot of work has been done on extracting the model of web user behavior. Most of them target server-side logs that cannot track user behavior outside of the server. Recently, a no...
Shingo Otsuka, Masashi Toyoda, Jun Hirai, Masaru K...
ISW
2004
Springer
15 years 8 months ago
A Model for the Semantics of Attack Signatures in Misuse Detection Systems
Misuse Detection systems identify evidence of attacks by searching for patterns of known attacks (signatures). A main problem in this context is the modeling and specification of a...
Michael Meier
124
Voted
MIDDLEWARE
2004
Springer
15 years 8 months ago
On the benefits of decomposing policy engines into components
In order for middleware systems to be adaptive, their properties and services need to support a wide variety of application-specific policies. However, application developers and ...
Konstantin Beznosov
156
Voted
PROFES
2004
Springer
15 years 8 months ago
Refactoring Support Based on Code Clone Analysis
Abstract. Software maintenance is the most expensive activity in software development. Many software companies spent a large amount of cost to maintain the existing software system...
Yoshiki Higo, Toshihiro Kamiya, Shinji Kusumoto, K...