Sciweavers

6844 search results - page 1211 / 1369
» Web Service Security
Sort
View
176
Voted
WWW
2011
ACM
14 years 10 months ago
Low-infrastructure methods to improve internet access for mobile users in emerging regions
As information technology supports more aspects of modern life, digital access has become an important tool for developing regions to lift themselves from poverty. Though broadban...
Sibren Isaacman, Margaret Martonosi
ESWS
2011
Springer
14 years 7 months ago
DataFinland - A Semantic Portal for Open and Linked Datasets
The number of open datasets available on the web is increasing rapidly with the rise of the Linked Open Data (LOD) cloud and various governmental efforts for releasing public data ...
Matias Frosterus, Eero Hyvönen, Joonas Laitio
EMNLP
2011
14 years 3 months ago
Watermarking the Outputs of Structured Prediction with an application in Statistical Machine Translation
We propose a general method to watermark and probabilistically identify the structured outputs of machine learning algorithms. Our method is robust to local editing operations and...
Ashish Venugopal, Jakob Uszkoreit, David Talbot, F...
VLDB
2007
ACM
164views Database» more  VLDB 2007»
16 years 4 months ago
A new intrusion detection system using support vector machines and hierarchical clustering
Whenever an intrusion occurs, the security and value of a computer system is compromised. Network-based attacks make it difficult for legitimate users to access various network ser...
Latifur Khan, Mamoun Awad, Bhavani M. Thuraisingha...
SAC
2003
ACM
15 years 9 months ago
Systems Architecture for Pervasive Retail
Recent developments in mobile technologies and associated economies of scale via mature manufacturing processes have made possible the construction of pervasive systems in specifi...
George Roussos, Panos Kourouthanasis, Eugene A. Gr...
« Prev « First page 1211 / 1369 Last » Next »