Sciweavers

934 search results - page 131 / 187
» Discovering the Semantics of User Keywords
Sort
View
MIE
2008
112views Healthcare» more  MIE 2008»
14 years 11 months ago
Mining Knowledge from Corpora: an Application to Retrieval and Indexing
The present work aims at discovering new associations between medical concepts to be exploited as input in retrieval and indexing. Material and Methods: Association rules method is...
Lina Fatima Soualmia, Badisse Dahamna, Stéf...
GECCO
2008
Springer
123views Optimization» more  GECCO 2008»
14 years 10 months ago
MLS security policy evolution with genetic programming
In the early days a policy was a set of simple rules with a clear intuitive motivation that could be formalised to good effect. However the world is becoming much more complex. S...
Yow Tzu Lim, Pau-Chen Cheng, Pankaj Rohatgi, John ...
CCS
2010
ACM
14 years 8 months ago
NoTamper: automatic blackbox detection of parameter tampering opportunities in web applications
Web applications rely heavily on client-side computation to examine and validate form inputs that are supplied by a user (e.g., “credit card expiration date must be valid”). T...
Prithvi Bisht, Timothy Hinrichs, Nazari Skrupsky, ...
AINA
2010
IEEE
14 years 1 months ago
A Novel Cross Layer Intrusion Detection System in MANET
— Intrusion detection System forms a vital component of internet security. To keep pace with the growing trends, there is a critical need to replace single layer detection techno...
Rakesh Shrestha, Kyong-Heon Han, Dong-You Choi, Se...
SAC
2011
ACM
14 years 17 days ago
Software security aspects of Java-based mobile phones
More and more functionality is provided by mobile phones today; this trend will continue over the next years. However, with the increasing functionality new risks go along. This n...
Karsten Sohr, Tanveer Mustafa, Adrian Nowak