Sciweavers

24188 search results - page 4775 / 4838
» Computing on Encrypted Data
Sort
View
CCS
2010
ACM
14 years 10 months ago
@spam: the underground on 140 characters or less
In this work we present a characterization of spam on Twitter. We find that 8% of 25 million URLs posted to the site point to phishing, malware, and scams listed on popular blackl...
Chris Grier, Kurt Thomas, Vern Paxson, Michael Zha...
CCS
2010
ACM
14 years 10 months ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...
SIGCOMM
2010
ACM
14 years 10 months ago
Cloudward bound: planning for beneficial migration of enterprise applications to the cloud
In this paper, we tackle challenges in migrating enterprise services into hybrid cloud-based deployments, where enterprise operations are partly hosted on-premise and partly in th...
Mohammad Y. Hajjat, Xin Sun, Yu-Wei Eric Sung, Dav...
CIMAGING
2010
165views Hardware» more  CIMAGING 2010»
14 years 10 months ago
Virtual surgical modification for planning tetralogy of Fallot repair
Goals for treating congenital heart defects are becoming increasingly focused on the long-term, targeting solutions that last into adulthood. Although this shift has motivated the...
Jonathan Plasencia, Haithem Babiker, Randy Richard...
SIGMOD
2010
ACM
221views Database» more  SIGMOD 2010»
14 years 10 months ago
Analyzing the energy efficiency of a database server
Rising energy costs in large data centers are driving an agenda for energy-efficient computing. In this paper, we focus on the role of database software in affecting, and, ultimat...
Dimitris Tsirogiannis, Stavros Harizopoulos, Mehul...
« Prev « First page 4775 / 4838 Last » Next »