Sciweavers

4334 search results - page 787 / 867
» Distributed Data Management Support for Collaborative Comput...
Sort
View
WWW
2008
ACM
16 years 2 months ago
Sessionlock: securing web sessions against eavesdropping
Typical web sessions can be hijacked easily by a network eavesdropper in attacks that have come to be designated "sidejacking." The rise of ubiquitous wireless networks,...
Ben Adida
ADBIS
2009
Springer
108views Database» more  ADBIS 2009»
15 years 8 months ago
Probabilistic Granule-Based Inside and Nearest Neighbor Queries
The development of location-based services and advances in the field of mobile computing have motivated an intensive research effort devoted to the efficient processing of locati...
Sergio Ilarri, Antonio Corral, Carlos Bobed, Eduar...
105
Voted
HICSS
2006
IEEE
138views Biometrics» more  HICSS 2006»
15 years 7 months ago
An Efficient Algorithm for Real-Time Frequent Pattern Mining for Real-Time Business Intelligence Analytics
Finding frequent patterns from databases has been the most time consuming process in data mining tasks, like association rule mining. Frequent pattern mining in real-time is of in...
Rajanish Dass, Ambuj Mahanti
ICDIM
2006
IEEE
15 years 7 months ago
Model-Driven Development of Content-Based Image Retrieval Systems
: Generic systems for content-based image retrieval (CBIR), such as QBIC [7] cannot be used to solve domain-specific image retrieval problems, as for example, the identification of...
Temenushka Ignatova
108
Voted
ACMICEC
2006
ACM
148views ECommerce» more  ACMICEC 2006»
15 years 7 months ago
Web based information for product ranking in e-business: a fuzzy approach
In this paper we have introduced a methodology to rank the available products in the Internet market. These rankings are based on the customers’ own preferences and also on the ...
B. K. Mohanty, K. Passi