Sciweavers

4623 search results - page 774 / 925
» Knowledge Representation on the Web
Sort
View
GLOBECOM
2008
IEEE
14 years 11 months ago
Bypassing Security Toolbars and Phishing Filters via DNS Poisoning
—Security toolbars are used to protect naive users against phishing attacks by displaying warnings on suspicious sites. Recently, web browsers have added built-in phishing filte...
Saeed Abu-Nimeh, Suku Nair
84
Voted
CIDM
2007
IEEE
14 years 10 months ago
Detection of Unknown Computer Worms Activity Based on Computer Behavior using Data Mining
— Detecting unknown worms is a challenging task. Extant solutions, such as anti-virus tools, rely mainly on prior explicit knowledge of specific worm signatures. As a result, aft...
Robert Moskovitch, Ido Gus, Shay Pluderman, Dima S...
109
Voted
CONSTRAINTS
2008
182views more  CONSTRAINTS 2008»
14 years 10 months ago
Constraint Programming in Structural Bioinformatics
Bioinformatics aims at applying computer science methods to the wealth of data collected in a variety of experiments in life sciences (e.g. cell and molecular biology, biochemistry...
Pedro Barahona, Ludwig Krippahl
CORR
2008
Springer
68views Education» more  CORR 2008»
14 years 10 months ago
Comparing human and automatic thesaurus mapping approaches in the agricultural domain
Knowledge organization systems (KOS), like thesauri and other controlled vocabularies, are used to provide subject access to information systems across the web. Due to the heterog...
Boris Lauser, Gudrun Johannsen, Caterina Caracciol...
94
Voted
IIE
2006
130views more  IIE 2006»
14 years 10 months ago
A Study on the Perception of Students towards Educational Weblogs
Weblogs are a popular form of easy-to-use personal publishing that has attracted millions of bloggers to share their personal thoughts, opinions, and knowledge on the web. The vers...
Andrew K. Lui, Sheung-On Choy, Yannie H. Y. Cheung...