Sciweavers

380 search results - page 36 / 76
» Trajectory Based Behavior Analysis for User Verification
Sort
View
IJNSEC
2008
131views more  IJNSEC 2008»
15 years 3 months ago
Performance Analysis of Soft Computing Based Anomaly Detectors
Anomaly detectors have become a necessary component of the computer and information security framework. Some of the numerous drawbacks experienced by the current Anomaly detectors...
N. Srinivasan, V. Vaidehi
148
Voted
ICSOC
2005
Springer
15 years 9 months ago
Pattern-Based Specification and Validation of Web Services Interaction Properties
There have been significant efforts in providing semantic descriptions for Web services, including the approach as exemplified by OWLS. Part of the semantic description in OWL-S is...
Zheng Li, Jun Han, Yan Jin
128
Voted
INFOCOM
2008
IEEE
15 years 10 months ago
Delay Tolerant Collaborations among Campus-Wide Wireless Users
Abstract—The ubiquitous deployment of wireless LAN networks are allowing students to embrace laptops as their preferred computing platform. We investigated the viability of build...
Xuwen Yu, Surendar Chandra
166
Voted
IHI
2010
186views Healthcare» more  IHI 2010»
14 years 10 months ago
Analysis of an online health social network
With the continued advances of Web 2.0, health-centered Online Social Networks (OSNs) are emerging to provide knowledge and support for those interested in managing their own heal...
Xiaoxiao Ma, Guanling Chen, Juntao Xiao
171
Voted
PREMI
2007
Springer
15 years 9 months ago
Discovery of Process Models from Data and Domain Knowledge: A Rough-Granular Approach
The rapid expansion of the Internet has resulted not only in the ever-growing amount of data stored therein, but also in the burgeoning complexity of the concepts and phenomena per...
Andrzej Skowron