Sciweavers

12194 search results - page 58 / 2439
» cans 2010
Sort
View
131
Voted
TELSYS
2010
132views more  TELSYS 2010»
14 years 7 months ago
Defending the weakest link: phishing websites detection by analysing user behaviours
Phishing detection systems are principally based on the analysis of data moving from phishers to victims. In this paper we describe a novel approach for detecting phishing websites...
Xun Dong, John A. Clark, Jeremy L. Jacob
ICDE
2010
IEEE
180views Database» more  ICDE 2010»
15 years 23 days ago
Adaptive indexing for relational keys
: © Adaptive indexing for relational keys Goetz Graefe, Harumi Kuno HP Laboratories HPL-2010-23 databases, indexes, storage systems, B-trees, adaptive merging, database cracking A...
Goetz Graefe, Harumi A. Kuno
78
Voted
IPMU
2010
Springer
14 years 11 months ago
Addressing Complexity in a Privacy Expert System
:  Simple Mode: Addressing Knowledge Engineering Complexity in a Privacy Expert System Siani Pearson HP Laboratories HPL-2010-75 privacy, decision support, usability, knowledge ...
Siani Pearson
112
Voted
IJIIDS
2010
136views more  IJIIDS 2010»
14 years 7 months ago
Kleisli category and database mappings
Abstract. This paper presents the semantics of database mappings in the relational database (DB) category, based on the power-view monad T and monadic algebras. The semantics can b...
Zoran Majkic, Bhanu Prasad
JUCS
2010
151views more  JUCS 2010»
14 years 7 months ago
A Semantic Wiki Framework for Reconciling Conflict Collaborations Based on Selecting Consensus Choice
: Semantic wikis have been regarded as an important collaboration tool among a number of experts from multiple domains. This wiki platform can play a role of collaborative knowledg...
Dosam Hwang, Ngoc Thanh Nguyen, Jason J. Jung, Abo...