Sciweavers

205 search results - page 39 / 41
» Detecting algorithmically generated malicious domain names
Sort
View
INFOCOM
2012
IEEE
11 years 8 months ago
CONSEL: Connectivity-based segmentation in large-scale 2D/3D sensor networks
—A cardinal prerequisite for the system design of a sensor network, is to understand the geometric environment where sensor nodes are deployed. The global topology of a largescal...
Hongbo Jiang, Tianlong Yu, Chen Tian, Guang Tan, C...
PCM
2005
Springer
119views Multimedia» more  PCM 2005»
13 years 11 months ago
Haptic Interaction with Depth Video Media
Abstract. In this paper we propose a touch enabled video player system. A conventional video player only allows viewers to passively experience visual and audio media. In virtual e...
Jongeun Cha, Seung Man Kim, Ian Oakley, Jeha Ryu, ...
NDSS
2006
IEEE
14 years 2 days ago
Protocol-Independent Adaptive Replay of Application Dialog
For many applications—including recognizing malware variants, determining the range of system versions vulnerable to a given attack, testing defense mechanisms, and filtering m...
Weidong Cui, Vern Paxson, Nicholas Weaver, Randy H...
ICDM
2002
IEEE
138views Data Mining» more  ICDM 2002»
13 years 11 months ago
Extraction Techniques for Mining Services from Web Sources
The Web has established itself as the dominant medium for doing electronic commerce. Consequently the number of service providers, both large and small, advertising their services...
Hasan Davulcu, Saikat Mukherjee, I. V. Ramakrishna...
SIGMOD
2010
ACM
201views Database» more  SIGMOD 2010»
13 years 6 months ago
I4E: interactive investigation of iterative information extraction
Information extraction systems are increasingly being used to mine structured information from unstructured text documents. A commonly used unsupervised technique is to build iter...
Anish Das Sarma, Alpa Jain, Divesh Srivastava