Sciweavers

1031 search results - page 112 / 207
» Bayesian Information Extraction Network
Sort
View
146
Voted
NDSS
2008
IEEE
15 years 9 months ago
Automatic Network Protocol Analysis
Protocol reverse engineering is the process of extracting application-level specifications for network protocols. Such specifications are very helpful in a number of security-re...
Gilbert Wondracek, Paolo Milani Comparetti, Christ...
SEMWEB
2010
Springer
15 years 1 months ago
Toponym Resolution in Social Media
Increasingly user-generated content is being utilised as a source of information, however each individual piece of content tends to contain low levels of information. In addition, ...
Neil Ireson, Fabio Ciravegna
150
Voted
SC
2003
ACM
15 years 8 months ago
Traffic-based Load Balance for Scalable Network Emulation
Load balance is critical to achieving scalability for large network emulation studies, which are of compelling interest for emerging Grid, Peer to Peer, and other distributed appl...
Xin Liu, Andrew A. Chien
ISI
2006
Springer
15 years 3 months ago
Database Security Protection Via Inference Detection
Access control mechanisms are commonly used to provide control over who may access sensitive information. However, malicious users can exploit the correlation among the data and in...
Yu Chen, Wesley W. Chu
CORR
2011
Springer
339views Education» more  CORR 2011»
14 years 10 months ago
Context Capture in Software Development
The context of a software developer is something hard to define and capture, as it represents a complex network of elements across different dimensions that are not limited to th...
Bruno Antunes, Francisco Correia, Paulo Gomes