Sciweavers

20638 search results - page 4043 / 4128
» Computer Networks
Sort
View
WWW
2003
ACM
15 years 10 months ago
Personal Voice Call Assistant: VoiceXML and SIP in a Distributed Environment
In this paper we introduce the architecture of a distributed service platform that integrates speech, web technology and voice-overIP technologies and describe how a specific serv...
Michael Pucher, Julia Tertyshnaya, Florian Wegsche...
WSDM
2010
ACM
315views Data Mining» more  WSDM 2010»
15 years 7 months ago
SBotMiner: Large Scale Search Bot Detection
In this paper, we study search bot traffic from search engine query logs at a large scale. Although bots that generate search traffic aggressively can be easily detected, a large ...
Fang Yu, Yinglian Xie, Qifa Ke
EUROSYS
2008
ACM
15 years 7 months ago
Eudaemon: involuntary and on-demand emulation against zero-day exploits
Eudaemon is a technique that aims to blur the borders between protected and unprotected applications, and brings together honeypot technology and end-user intrusion detection and ...
Georgios Portokalidis, Herbert Bos
EUROSYS
2006
ACM
15 years 7 months ago
The SMART way to migrate replicated stateful services
Many stateful services use the replicated state machine approach for high availability. In this approach, a service runs on multiple machines to survive machine failures. This pap...
Jacob R. Lorch, Atul Adya, William J. Bolosky, Ron...
SIGCOMM
2009
ACM
15 years 4 months ago
SMS-based contextual web search
SMS-based web search is different from traditional web search in that the final response to a search query is limited to a very small number of bytes (typically 1-2 SMS messages...
Jay Chen, Brendan Linn, Lakshminarayanan Subramani...
« Prev « First page 4043 / 4128 Last » Next »