The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The digitization of healthcare data has been consolidated in the last decade as a must to manage the vast amount of data generated by healthcare organizations. Carrying out this process effectively represents an enabling resource that will improve healthcare services provision, as well as on-the-edge related applications, ranging from clinical text mining to predictive modelling, survival analysis,...
This paper proposes a methodology and a tool to evaluate the security risk presented when using software components or systems. The risk is estimated based on known vulnerabilities existing on the software components. An automated tool is used to extract and aggregate information on vulnerabilities reported by users and available on public databases (e.g., OSVDB and NVD). This tool generates comprehensive...
The following topics are dealt with: digital content; digital life; e-learning; Web service; HCI; information security; mobile computing; wireless communication; vehicular technology; image processing; computer graphics; multimedia technologies; computer architecture; SoC; embedded systems; artificial intelligence; knowledge discovery; fuzzy systems; computer networks; Web technologies; biomedical...
The following topics are dealt with: Web services; multi-agent system; natural language processing; knowledge discovery; data mining; robotics; evolutionary computation; computer vision; scheduling; planning; ontology; information retrieval; knowledge representation; reasoning; software security; data warehouse; grid computing; and image processing.
The following topics are dealt with: clusters and grids computing; wireless sensor network; Web service; communication networks; distributed systems; P2P networks; computational intelligence; service-oriented architecture; data mining; data security; numerical algorithm; image processing; economic computing; networked robot systems; and clouds computing.
The following topics are dealt with: database technology; Web information management; Web information system security; quality assurance; Web information mining; information retrieval; Web service; semantic Web; deep Web technology; ontology; and electronic government technology.
The paper deals with the following topics: granular computing; data mining; fuzzy logic; information systems; Internet; fuzzy set theory; rough set theory; image processing; association rules; data security; Web services; cryptography; mobile computing; and support vector machines.
The following topics are dealt with: Web services; collaborative filtering; QoS-aware services composition; context-aware service discovery; service security and trust; and context-aware middleware.
A web service security analysis model based on program slicing is proposed, which can be used to find existence of critical information disclosure vulnerabilities and proliferation of such vulnerabilities in a web service net, and eventually improve protection of critical information. Web service protocol is analyzed to obtain external service interfaces; source code is sliced to obtain interface...
A web service security analysis model based on program slicing is proposed, which can be used to find existence of critical information disclosure vulnerabilities and proliferation of such vulnerabilities in a web service net, and eventually improve protection of critical information. Web service protocol is analyzed to obtain external service interfaces; source code is sliced to obtain interface...
The following topics are dealt with:software watermarking algorithm; register allocation; fuzzy principal component analysis; gait recognition; intrusion detection; BIBD code; anticollision fingerprint; artificial neural network; information hiding algorithm; color image; logistics distribution simulation; Web mining; support vector machines; pseudo random sequence; DS-CDMA signals; fuzzy set theory;...
The following topics are dealt with: data security; pattern classification; mobile computing; text-to-speech synthesis; user interfaces; Web services; medical computing; customer relationship management; optimisation; genetic algorithms; learning; data mining; computer aided instruction; software engineering; watermarking schemes; wireless sensor networks; educational administration; evolutionary...
The following topics are dealt: cyber engineering; human space computing; distributed networks; security and privacy; heterogeneous wireless networks; resource management; security in wireless systems; web services; web and mobile applications; data models and query processing; performance evaluation and testing; SOA and embedded systems; middleware; cloud computing; RFID; wireless sensor networks;...
The following topics are dealt with : SOA implementation strategy; CRM system; semantic Web services; ERP system; telecom services management; objectionable video classification; software aging state evaluation; task-driven data mining; social-MRC social consensus formation support system; user-driven geospatial Web data; AC-DC boost converter; workflow modeling; customer satisfaction; maritime logistics;...
Trust problems exist in open distributed service oriented computing environments. A lot of research work has been done on the theories and applications of trust and reputation management in service oriented environment. However, the design expertise on trust is not well documented yet. In this paper we propose to use trust patterns for documenting solutions for trust problems. The main benefit of...
Facing the enlarging scale of Grid and its increasing number of users, the Grid Service Providers (GSPs) need to evaluate and manage the trust of all users effectively. A D-S-theory-based multi-level trust evaluation model is proposed in this paper to solve the problem. In accord with the architecture for Grid, this model makes the result more reasonable and accurate, restrains the attacks such as...
With trust degree set to be the foundation of component service selection in composite service, the execution and selection of composite services could be carried out more effectively based on the trust degree of service; It is favorable for those component services with higher trust degree to join into the process of service composition, thus, enhances the trustiness of composite service. Through...
Trust is major concern in ecommerce, ebanking, ebusiness, etc. Providing a clear trust model helps researchers, developers, and consumers in their own way to achieve their goals more efficiently. Last layer in the Semantic Web Structure is dedicated to trust to deal with uncertainty. In this paper a trust models for the Semantic Web is proposed. Experimental results are presented to demonstrate the...
The major weakness in modern detection methods in the snorts is that the power of snorts is restricted only to the network on which algorithms are applied. This paper presents a new method to solve issues considering locality. We place anomaly detection algorithms that used in snorts in form of services within verified servers. The major advantage of this method is that the former snort strategies...
The following topics are dealt with: computer science-technology; image matching; network intrusion detection system; data warehouse; data streams clustering algorithm; association rules; Web service; e-commerce; data security; Webpage content extraction; distance education; text classification; and image edge detection.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.