Sciweavers

2075 search results - page 201 / 415
» aime 2007
Sort
View
DIMVA
2006
15 years 2 months ago
Network-Level Polymorphic Shellcode Detection Using Emulation
Abstract. As state-of-the-art attack detection technology becomes more prevalent, attackers are likely to evolve, employing techniques such as polymorphism and metamorphism to evad...
Michalis Polychronakis, Kostas G. Anagnostakis, Ev...
105
Voted
ECEH
2006
101views Healthcare» more  ECEH 2006»
15 years 2 months ago
Towards European Patient Summaries based on Triple Space Computing
: Medical practice today still entails sorting through scattered information on a specific patient. Making things more difficult, the EU, in bringing its member states closer toget...
Dario Cerizza, Emanuele Della Valle, Doug Foxvog, ...
123
Voted
BDA
2001
15 years 2 months ago
Querying RDF Descriptions for Community Web Portals
Community Web Portals (e.g., digital libraries, vertical aggregators, infomediaries) have become quite popular nowadays in supporting specific communities of interest on corporate...
Gregory Karvounarakis, Vassilis Christophides, Dim...
109
Voted
BNCOD
2003
127views Database» more  BNCOD 2003»
15 years 2 months ago
Performance Evaluation and Analysis of K-Way Join Variants for Association Rule Mining
Data mining aims at discovering important and previously unknown patterns from the dataset in the underlying database. Database mining performs mining directly on data stored in r...
P. Mishra, Sharma Chakravarthy
97
Voted
CRIWG
2001
15 years 2 months ago
Yaka: Document Notification and Delivery Across Heterogeneous Document Repositories
Nowadays people have to deal with an increasing amount of information contained in electronic documents available from numerous heterogeneous, widely distributed sources. Keeping ...
Damián Arregui, François Pacull, Jut...