Sciweavers

2824 search results - page 448 / 565
» Text Generation from Keywords
Sort
View
ACSAC
2010
IEEE
15 years 1 months ago
Paranoid Android: versatile protection for smartphones
Smartphone usage has been continuously increasing in recent years. Moreover, smartphones are often used for privacysensitive tasks, becoming highly valuable targets for attackers....
Georgios Portokalidis, Philip Homburg, Kostas Anag...
123
Voted
EUSFLAT
2009
124views Fuzzy Logic» more  EUSFLAT 2009»
15 years 1 months ago
Development of a Fuzzy Expert System for a Nutritional Guidance Application
The importance of nutritional guidance grows as nutritional problems, such as obesity and type-2 diabetes, are becoming more common. Nutritional guidance is carried out by mapping ...
Petri Heinonen, Marjo Mannelin, Hannu Iskala, Aki ...
CORR
2010
Springer
173views Education» more  CORR 2010»
15 years 22 days ago
Mining Multi-Level Frequent Itemsets under Constraints
Mining association rules is a task of data mining, which extracts knowledge in the form of significant implication relation of useful items (objects) from a database. Mining multi...
Mohamed Salah Gouider, Amine Farhat
DOLAP
2010
ACM
15 years 22 days ago
Using ontologies to discover fact IDs
Object identification is a crucial step in most information systems. Nowadays, we have many different ways to identify entities such as surrogates, keys and object identifiers. Ho...
Alberto Abelló, Oscar Romero
SIMULATION
2010
178views more  SIMULATION 2010»
14 years 10 months ago
Application-level Simulation for Network Security
We introduce and describe a novel network simulation tool called NeSSi (Network Security Simulator). NeSSi incorporates a variety of features relevant to network security distingu...
Stephan Schmidt, Rainer Bye, Joël Chinnow, Ka...