Sciweavers

489 search results - page 77 / 98
» Effective techniques for automatic extraction of Web publica...
Sort
View
ACSAC
2002
IEEE
15 years 6 months ago
Throttling Viruses: Restricting propagation to defeat malicious mobile code
Modern computer viruses spread incredibly quickly, far faster than human-mediated responses. This greatly increases the damage that they cause. This paper presents an approach to ...
Matthew M. Williamson
INFOCOM
2010
IEEE
15 years 11 days ago
ISP-Enabled Behavioral Ad Targeting without Deep Packet Inspection
—Online advertising is a rapidly growing industry currently dominated by the search engine ’giant’ Google. In an attempt to tap into this huge market, Internet Service Provid...
Gabriel Maciá-Fernández, Yong Wang, ...
EUROISI
2008
15 years 3 months ago
Homeland Security Data Mining Using Social Network Analysis
The tragic events of September 11th have caused drastic effects on many aspects of society. Academics in the fields of computational and information science have been called upon ...
Hsinchun Chen
CLEF
2006
Springer
15 years 5 months ago
UB at GeoCLEF 2006
This paper summarizes the work done at the State University of New York at Buffalo (UB) in the GeoCLEF 2006 track. The approach presented uses pure IR techniques (indexing of sing...
Miguel E. Ruiz, June M. Abbas, David Mark, Stuart ...
RE
2001
Springer
15 years 6 months ago
The Role of Policy and Stakeholder Privacy Values in Requirements Engineering
Diverse uses of information technology (IT) in organizations affect privacy. Developers of electronic commerce, database management, security mechanisms, telecommunication and col...
Annie I. Antón, Julia Brande Earp, Thomas A...