Sciweavers

1585 search results - page 294 / 317
» Automatically optimizing secure computation
Sort
View
WSDM
2010
ACM
315views Data Mining» more  WSDM 2010»
15 years 11 months ago
SBotMiner: Large Scale Search Bot Detection
In this paper, we study search bot traffic from search engine query logs at a large scale. Although bots that generate search traffic aggressively can be easily detected, a large ...
Fang Yu, Yinglian Xie, Qifa Ke
ICWS
2009
IEEE
15 years 10 months ago
Wrap Scientific Applications as WSRF Grid Services Using gRAVI
— Web service models are increasingly being used in the Grid community as way to create distributed applications exposing data and/or applications through self describing interfa...
Kyle Chard, Wei Tan, Joshua Boverhof, Ravi K. Madd...
EUROSYS
2010
ACM
15 years 10 months ago
Reverse Engineering of Binary Device Drivers with RevNIC
This paper presents a technique that helps automate the reverse engineering of device drivers. It takes a closed-source binary driver, automatically reverse engineers the driverâ€...
Vitaly Chipounov, George Candea
IMC
2006
ACM
15 years 7 months ago
Unexpected means of protocol inference
Network managers are inevitably called upon to associate network trafï¬c with particular applications. Indeed, this operation is critical for a wide range of management functions...
Justin Ma, Kirill Levchenko, Christian Kreibich, S...
CIKM
2005
Springer
15 years 7 months ago
MailRank: using ranking for spam detection
Can we use social networks to combat spam? This paper investigates the feasibility of MailRank, a new email ranking and classiï¬cation scheme exploiting the social communication ...
Paul-Alexandru Chirita, Jörg Diederich, Wolfg...