Sciweavers

499 search results - page 88 / 100
» A Study on Latent Vulnerabilities
Sort
View
99
Voted
WWW
2011
ACM
14 years 7 months ago
Geographical topic discovery and comparison
This paper studies the problem of discovering and comparing geographical topics from GPS-associated documents. GPSassociated documents become popular with the pervasiveness of loc...
Zhijun Yin, Liangliang Cao, Jiawei Han, Chengxiang...
123
Voted
KDD
2012
ACM
212views Data Mining» more  KDD 2012»
13 years 2 months ago
Factoring past exposure in display advertising targeting
Online advertising is increasingly becoming more performance oriented, where the decision to show an advertisement to a user is made based on the user’s propensity to respond to...
Neha Gupta, Abhimanyu Das, Sandeep Pandey, Vijay K...
ICCV
2005
IEEE
16 years 2 months ago
Class-Specific Material Categorisation
Although a considerable amount of work has been published on material classification, relatively little of it studies situations with considerable variation within each class. Man...
Barbara Caputo, Eric Hayman, P. Mallikarjuna
MOBIHOC
2005
ACM
16 years 9 hour ago
A secure ad-hoc routing approach using localized self-healing communities
Mobile ad hoc networks (MANETs) are vulnerable to routing attacks, especially attacks launched by non-cooperative (selfish or compromised) network members and appear to be protoco...
Jiejun Kong, Xiaoyan Hong, Yunjung Yi, Joon-Sang P...
TLDI
2009
ACM
108views Formal Methods» more  TLDI 2009»
15 years 9 months ago
Secure compilation of a multi-tier web language
Storing state in the client tier (in forms or cookies, for example) improves the efficiency of a web application, but it also renders the secrecy and integrity of stored data vul...
Ioannis G. Baltopoulos, Andrew D. Gordon