Sciweavers

1943 search results - page 255 / 389
» Web application security engineering
Sort
View
168
Voted
ACMSE
2009
ACM
15 years 10 months ago
Applying randomized projection to aid prediction algorithms in detecting high-dimensional rogue applications
This paper describes a research effort to improve the use of the cosine similarity information retrieval technique to detect unknown, known or variances of known rogue software by...
Travis Atkison
154
Voted
BMCBI
2008
163views more  BMCBI 2008»
15 years 3 months ago
i-SEGOPubmed: a web interface for semantic enabled browsing of PubMed using Gene Ontology
imately 20 million abstracts. Browsing such a huge repository to find relevant information as well as providing elearning service requires new generation of interfaces. Methods suc...
Mohammed Yeasin, Bhanu Vanteru, Jahangheer S. Shai...
136
Voted
SIGMOD
2000
ACM
99views Database» more  SIGMOD 2000»
15 years 8 months ago
WSQ/DSQ: A Practical Approach for Combined Querying of Databases and the Web
We present WSQ/DSQ (pronounced “wisk-disk”), a new approach for combining the query facilities of traditional databases with existing search engines on the Web. WSQ, for Web-S...
Roy Goldman, Jennifer Widom
108
Voted
NDSS
2007
IEEE
15 years 10 months ago
Generic Application-Level Protocol Analyzer and its Language
Application-level protocol analyzers are important components in tools such as intrusion detection systems, firewalls, and network monitors. Currently, protocol analyzers are wri...
Nikita Borisov, David Brumley, Helen J. Wang, John...
121
Voted
SIGSOFT
2007
ACM
16 years 4 months ago
Detection and resolution of atomicity violation in service composition
Atomicity is a desirable property that safeguards application consistency for service compositions. A service composition exhibiting this property could either complete or cancel ...
Chunyang Ye, S. C. Cheung, W. K. Chan, Chang Xu