Sciweavers

371 search results - page 26 / 75
» Template Based Semantic Similarity for Security Applications
Sort
View
DEEC
2005
IEEE
15 years 3 months ago
Using Semantic Information to Improve Transparent Query Caching for Dynamic Content Web Sites
In this paper, we study the use of semantic information to improve performance of transparent query caching for dynamic content web sites. We observe that in dynamic content web a...
Gokul Soundararajan, Cristiana Amza
112
Voted
ACMSE
2009
ACM
15 years 4 months ago
Applying randomized projection to aid prediction algorithms in detecting high-dimensional rogue applications
This paper describes a research effort to improve the use of the cosine similarity information retrieval technique to detect unknown, known or variances of known rogue software by...
Travis Atkison
IJBRA
2008
88views more  IJBRA 2008»
14 years 9 months ago
GOSAP: Gene Ontology-Based Semantic Alignment of Biological Pathways
A large number of biological pathways have been assembled in later years, and are being stored in databases. Hence, the need for methods to analyse these pathways has emerged. One ...
Jonas Gamalielsson, Björn Olsson
ICMCS
2000
IEEE
172views Multimedia» more  ICMCS 2000»
15 years 2 months ago
Multi Layer Video Object Database based on Interactive Annotation and its Application
As the use of applications employing video contents becomes widespread, it is crucial for representation systems to be able to handle video effectively and flexibly. In this pape...
Tomoyuki Yatabe, Hiroshi Kawasaki, Hiroshi Mo, Mas...
ICC
2009
IEEE
118views Communications» more  ICC 2009»
15 years 4 months ago
A First Order Logic Security Verification Model for SIP
: It is well known that no security mechanism can provide full protection against a potential attack. There is always a possibility that a security incident may happen, mainly as a...
Dimitris Geneiatakis, Costas Lambrinoudakis, Georg...