Sciweavers

14 search results - page 2 / 3
» Measures to Detect Word Substitution in Intercepted Communic...
Sort
View
CIKM
2007
Springer
14 years 4 days ago
Using word similarity to eradicate junk emails
Emails are one of the most commonly used modern communication media these days; however, unsolicited emails obstruct this otherwise fast and convenient technology for information ...
Maria Soledad Pera, Yiu-Kai Ng
JISE
2010
94views more  JISE 2010»
13 years 23 days ago
Remote Detection and Monitoring of a Water Level Using Narrow Band Channel
: - To measure water levels from remote cites using a narrowband channel, this paper developed a difference image based JPEG communication scheme and a water level measurement sche...
Jaehyoung Yu, Hernsoo Hahn
SAC
2010
ACM
14 years 25 days ago
TokDoc: a self-healing web application firewall
The growing amount of web-based attacks poses a severe threat to the security of web applications. Signature-based detection techniques increasingly fail to cope with the variety ...
Tammo Krueger, Christian Gehl, Konrad Rieck, Pavel...
CIKM
2009
Springer
14 years 17 days ago
Analyzing and evaluating query reformulation strategies in web search logs
Users frequently modify a previous search query in hope of retrieving better results. These modifications are called query reformulations or query refinements. Existing research h...
Jeff Huang, Efthimis N. Efthimiadis
COMCOM
2008
87views more  COMCOM 2008»
13 years 6 months ago
Providing VANET security through active position detection
Vehicle position is one of the most valuable pieces of information in a Vehicular Adhoc NETwork (VANET). The main contribution of this work is a novel approach to enhancing positi...
Gongjun Yan, Stephan Olariu, Michele C. Weigle