Sciweavers

4047 search results - page 673 / 810
» The Discrete Basis Problem
Sort
View
DRM
2006
Springer
15 years 7 months ago
Proteus: virtualization for diversified tamper-resistance
Despite huge efforts by software providers, software protection mechanisms are still broken on a regular basis. Due to the current distribution model, an attack against one copy o...
Bertrand Anckaert, Mariusz H. Jakubowski, Ramarath...
ECML
2006
Springer
15 years 7 months ago
Cost-Sensitive Learning of SVM for Ranking
Abstract. In this paper, we propose a new method for learning to rank. `Ranking SVM' is a method for performing the task. It formulizes the problem as that of binary classific...
Jun Xu, Yunbo Cao, Hang Li, Yalou Huang
AC
2003
Springer
15 years 7 months ago
Business Process Management Demystified: A Tutorial on Models, Systems and Standards for Workflow Management
Abstract. Over the last decade there has been a shift from "data-aware" information systems to "process-aware" information systems. To support business processe...
Wil M. P. van der Aalst
ACSAC
2001
IEEE
15 years 7 months ago
Securing Web Servers against Insider Attack
Too often, "security of Web transactions" reduces to "encryption of the channel"--and neglects to address what happens at the server on the other end. This ove...
Shan Jiang, Sean W. Smith, Kazuhiro Minami
APWEB
2003
Springer
15 years 7 months ago
A Web User Profiling Approach
People display regularities in almost everything they do. This paper proposes characteristics of an idealized algorithm that would allow an automatic extraction of web user profil ...
Younes Hafri, Chabane Djeraba, Peter L. Stanchev, ...