Sciweavers

4469 search results - page 790 / 894
» Comparing and Combining Profiles
Sort
View
WWW
2010
ACM
15 years 10 months ago
Detection and analysis of drive-by-download attacks and malicious JavaScript code
JavaScript is a browser scripting language that allows developers to create sophisticated client-side interfaces for web applications. However, JavaScript code is also used to car...
Marco Cova, Christopher Krügel, Giovanni Vign...
WWW
2010
ACM
15 years 10 months ago
Large-scale bot detection for search engines
In this paper, we propose a semi-supervised learning approach for classifying program (bot) generated web search traffic from that of genuine human users. The work is motivated by...
Hongwen Kang, Kuansan Wang, David Soukal, Fritz Be...
CHI
2010
ACM
15 years 10 months ago
Social gravity: a virtual elastic tether for casual, privacy-preserving pedestrian rendezvous
We describe a virtual “tether” for mobile devices that allows groups to have quick, simple and privacy-preserving meetups. Our design provides cues which allow dynamic coordin...
John Williamson, Simon Robinson, Craig Stewart, Ro...
TEI
2010
ACM
110views Hardware» more  TEI 2010»
15 years 10 months ago
Empowering programmability for tangibles
Programming microcontrollers for tangible interfaces can be easier and more accessible than it is now, empowering a broader audience to participate. The first part of this studio ...
Eric Rosenbaum, Evelyn Eastmond, David Mellis
EVOW
2010
Springer
15 years 10 months ago
Parameter Tuning of Evolutionary Algorithms: Generalist vs. Specialist
Abstract. Finding appropriate parameter values for Evolutionary Algorithms (EAs) is one of the persistent challenges of Evolutionary Computing. In recent publications we showed how...
Selmar K. Smit, A. E. Eiben