Sciweavers

12170 search results - page 2385 / 2434
» Ranking Information in Networks
Sort
View
SOUPS
2006
ACM
15 years 8 months ago
The methodology and an application to fight against Unicode attacks
Unicode is becoming a dominant character representation format for information processing. This presents a very dangerous usability and security problem for many applications. The...
Anthony Y. Fu, Xiaotie Deng, Liu Wenyin, Greg Litt...
ACSAC
2005
IEEE
15 years 7 months ago
Multi-Level Security Requirements for Hypervisors
Using hypervisors or virtual machine monitors for security has become very popular in recent years, and a number of proposals have been made for supporting multi-level security on...
Paul A. Karger
CIMCA
2005
IEEE
15 years 7 months ago
Topic-Based Audience Metrics for Internet Marketing by Combining Ontologies and Output Page Mining
In Internet marketing, Web audience analysis is essential to understanding the visitors’ needs. However, the existing analysis tools fail to deliver summarized and conceptual me...
Jean-Pierre Norguet, Esteban Zimányi
CSB
2005
IEEE
210views Bioinformatics» more  CSB 2005»
15 years 7 months ago
Problem Solving Environment Approach to Integrating Diverse Biological Data Sources
Scientists face an ever-increasing challenge in investigating biological systems with high throughput experimental methods such as mass spectrometry and gene arrays because of the...
Eric G. Stephan, Kyle R. Klicker, Mudita Singhal, ...
DASFAA
2005
IEEE
106views Database» more  DASFAA 2005»
15 years 7 months ago
Real Datasets for File-Sharing Peer-to-Peer Systems
The fundamental drawback of unstructured peer-to-peer (P2P) networks is the flooding-based query processing protocol that seriously limits their scalability. As a result, a signiï...
Shen-Tat Goh, Panos Kalnis, Spiridon Bakiras, Kian...
« Prev « First page 2385 / 2434 Last » Next »