Sciweavers

24188 search results - page 4775 / 4838
» Computing on Encrypted Data
Sort
View
CCS
2010
ACM
15 years 1 days ago
@spam: the underground on 140 characters or less
In this work we present a characterization of spam on Twitter. We find that 8% of 25 million URLs posted to the site point to phishing, malware, and scams listed on popular blackl...
Chris Grier, Kurt Thomas, Vern Paxson, Michael Zha...
CCS
2010
ACM
15 years 1 days ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...
SIGCOMM
2010
ACM
15 years 1 days ago
Cloudward bound: planning for beneficial migration of enterprise applications to the cloud
In this paper, we tackle challenges in migrating enterprise services into hybrid cloud-based deployments, where enterprise operations are partly hosted on-premise and partly in th...
Mohammad Y. Hajjat, Xin Sun, Yu-Wei Eric Sung, Dav...
CIMAGING
2010
165views Hardware» more  CIMAGING 2010»
15 years 1 days ago
Virtual surgical modification for planning tetralogy of Fallot repair
Goals for treating congenital heart defects are becoming increasingly focused on the long-term, targeting solutions that last into adulthood. Although this shift has motivated the...
Jonathan Plasencia, Haithem Babiker, Randy Richard...
SIGMOD
2010
ACM
221views Database» more  SIGMOD 2010»
15 years 1 days ago
Analyzing the energy efficiency of a database server
Rising energy costs in large data centers are driving an agenda for energy-efficient computing. In this paper, we focus on the role of database software in affecting, and, ultimat...
Dimitris Tsirogiannis, Stavros Harizopoulos, Mehul...
« Prev « First page 4775 / 4838 Last » Next »