Sciweavers

456 search results - page 88 / 92
» Generating Multidimensional Schemas from the Semantic Web
Sort
View
ICC
2009
IEEE
150views Communications» more  ICC 2009»
15 years 4 months ago
Modeling Human Behavior for Defense Against Flash-Crowd Attacks
—Flash-crowd attacks are the most vicious form of distributed denial of service (DDoS). They flood the victim with service requests generated from numerous bots. Attack requests...
Georgios Oikonomou, Jelena Mirkovic
IAT
2008
IEEE
15 years 4 months ago
An Ontology-Driven Framework for Deploying JADE Agent Systems
Multi-agent systems have proven to be a powerful technology for building complex distributed applications. However, the process of designing, configuring and deploying agent-based...
Csongor Nyulas, Martin J. O'Connor, Samson W. Tu, ...
WEBI
2005
Springer
15 years 3 months ago
WICER: A Weighted Inter-Cluster Edge Ranking for Clustered Graphs
Several algorithms based on link analysis have been developed to measure the importance of nodes on a graph such as pages on the World Wide Web. PageRank and HITS are the most pop...
Divya Padmanabhan, Prasanna Kumar Desikan, Jaideep...
SDM
2009
SIAM
125views Data Mining» more  SDM 2009»
15 years 7 months ago
Providing Privacy through Plausibly Deniable Search.
Query-based web search is an integral part of many people’s daily activities. Most do not realize that their search history can be used to identify them (and their interests). I...
Chris Clifton, Mummoorthy Murugesan
ESWS
2010
Springer
15 years 2 months ago
LESS - Template-Based Syndication and Presentation of Linked Data
Recently, the publishing of structured, semantic information as linked data has gained quite some momentum. For ordinary users on the Internet, however, this information is not yet...
Sören Auer, Raphael Doehring, Sebastian Dietz...