Sciweavers

1298 search results - page 214 / 260
» Categorizing Vulnerabilities Using Data Clustering Technique...
Sort
View
ADC
2005
Springer
183views Database» more  ADC 2005»
15 years 7 months ago
Discovering User Access Pattern Based on Probabilistic Latent Factor Model
There has been an increased demand for characterizing user access patterns using web mining techniques since the informative knowledge extracted from web server log files can not ...
Guandong Xu, Yanchun Zhang, Jiangang Ma, Xiaofang ...
EGPGV
2004
Springer
175views Visualization» more  EGPGV 2004»
15 years 7 months ago
Interactive Parallel Visualization of Large Particle Datasets
This paper presents a new interactive parallel method for direct visualization of large particle datasets. Based on a parallel rendering cluster, a frame rate of 9 frames-per-seco...
Kevin Liang, Patricia Monger, Huge Couchman
WSDM
2010
ACM
204views Data Mining» more  WSDM 2010»
15 years 8 months ago
Learning URL patterns for webpage de-duplication
Presence of duplicate documents in the World Wide Web adversely affects crawling, indexing and relevance, which are the core building blocks of web search. In this paper, we pres...
Hema Swetha Koppula, Krishna P. Leela, Amit Agarwa...
CCS
2008
ACM
15 years 4 months ago
Privacy oracle: a system for finding application leaks with black box differential testing
We describe the design and implementation of Privacy Oracle, a system that reports on application leaks of user information via the network traffic that they send. Privacy Oracle ...
Jaeyeon Jung, Anmol Sheth, Ben Greenstein, David W...
CORR
2008
Springer
112views Education» more  CORR 2008»
15 years 2 months ago
SecMon: End-to-End Quality and Security Monitoring System
The Voice over Internet Protocol (VoIP) is becoming a more available and popular way of communicating for Internet users. This also applies to Peer-to-Peer (P2P) systems and mergi...
Tomasz Ciszkowski, Charlott Eliasson, Markus Fiedl...