Sciweavers

1581 search results - page 225 / 317
» Domain semantics of possibility computations
Sort
View
KDD
2009
ACM
257views Data Mining» more  KDD 2009»
15 years 7 months ago
Argo: intelligent advertising by mining a user's interest from his photo collections
In this paper, we introduce a system named Argo which provides intelligent advertising made possible from users’ photo collections. Based on the intuition that user-generated ph...
Xin-Jing Wang, Mo Yu, Lei Zhang, Rui Cai, Wei-Ying...
JFP
2008
72views more  JFP 2008»
15 years 18 days ago
Dynamic rebinding for marshalling and update, via redex-time and destruct-time reduction
Most programming languages adopt static binding, but for distributed programming an exclusive reliance on static binding is too restrictive: dynamic binding is required in various...
Peter Sewell, Gareth Stoyle, Michael Hicks, Gavin ...
101
Voted
SP
2006
IEEE
132views Security Privacy» more  SP 2006»
15 years 6 months ago
Towards Automatic Generation of Vulnerability-Based Signatures
In this paper we explore the problem of creating vulnerability signatures. A vulnerability signature matches all exploits of a given vulnerability, even polymorphic or metamorphic...
David Brumley, James Newsome, Dawn Xiaodong Song, ...
SOUPS
2006
ACM
15 years 6 months ago
The methodology and an application to fight against Unicode attacks
Unicode is becoming a dominant character representation format for information processing. This presents a very dangerous usability and security problem for many applications. The...
Anthony Y. Fu, Xiaotie Deng, Liu Wenyin, Greg Litt...
93
Voted
ICTAC
2004
Springer
15 years 6 months ago
Object Connectivity and Full Abstraction for a Concurrent Calculus of Classes
onnectivity and Full Abstraction for a Concurrent Calculus of Classes⋆ nded Abstract — Erika ´Abrah´am2 , Marcello M. Bonsangue3 , Frank S. de Boer4 , and Martin Steffen1 1 ...
Erika Ábrahám, Marcello M. Bonsangue...