Sciweavers

1992 search results - page 398 / 399
» Engineering Semantic Web Information Systems in Hera
Sort
View
CCS
2003
ACM
13 years 11 months ago
Enhancing byte-level network intrusion detection signatures with context
Many network intrusion detection systems (NIDS) use byte sequences as signatures to detect malicious activity. While being highly efficient, they tend to suffer from a high false...
Robin Sommer, Vern Paxson
WWW
2010
ACM
14 years 1 months ago
Fast and parallel webpage layout
The web browser is a CPU-intensive program. Especially on mobile devices, webpages load too slowly, expending significant time in processing a document’s appearance. Due to powe...
Leo A. Meyerovich, Rastislav Bodík
ACSAC
2009
IEEE
14 years 25 days ago
FIRE: FInding Rogue nEtworks
For many years, online criminals have been able to conduct their illicit activities by masquerading behind disreputable Internet Service Providers (ISPs). For example, organizatio...
Brett Stone-Gross, Christopher Kruegel, Kevin C. A...
ICDE
2006
IEEE
127views Database» more  ICDE 2006»
14 years 1 days ago
Processing Recursive XQuery over XML Streams: The Raindrop Approach
— XML stream applications bring the challenge of efficiently processing queries on sequentially accessible tokenbased data. For efficient processing of queries, we need to ensu...
Mingzhu Wei, Ming Li, Elke A. Rundensteiner, Mural...
MM
2004
ACM
178views Multimedia» more  MM 2004»
13 years 11 months ago
A bootstrapping framework for annotating and retrieving WWW images
Most current image retrieval systems and commercial search engines use mainly text annotations to index and retrieve WWW images. This research explores the use of machine learning...
HuaMin Feng, Rui Shi, Tat-Seng Chua