Sciweavers

1748 search results - page 161 / 350
» Using Aspect Programming to Secure Web Applications
Sort
View
PSSS
2003
15 years 4 months ago
Prolog-based Infrastructure for RDF: Scalability and Performance
The semantic web is a promising application-area for the Prolog programming language for its non-determinism and patternmatching. In this paper we outline an infrastructure for loa...
Jan Wielemaker, Guus Schreiber, Bob J. Wielinga
ACSAC
2010
IEEE
15 years 14 days ago
Who is tweeting on Twitter: human, bot, or cyborg?
Twitter is a new web application playing dual roles of online social networking and micro-blogging. Users communicate with each other by publishing text-based posts. The popularit...
Zi Chu, Steven Gianvecchio, Haining Wang, Sushil J...
ISI
2008
Springer
15 years 3 months ago
Real time intrusion prediction, detection and prevention programs
An Intrusion Detection Program (IDP) analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. In this talk, we p...
A. Abraham
IHI
2010
124views Healthcare» more  IHI 2010»
14 years 10 months ago
Reliable medical recommendation systems with patient privacy
One of the concerns patients have when confronted with a medical condition is which physician to trust. Any recommendation system that seeks to answer this question must ensure an...
T. Ryan Hoens, Marina Blanton, Nitesh V. Chawla
SAC
2009
ACM
15 years 9 months ago
Secure web-based retrieval of documents with usage controls
Usage controls enable the provider of some information to limit how recipients may use it. Usage controls may be desirable in enterprise environments, e.g., for regulatory complia...
Peter Djalaliev, José Carlos Brustoloni