Sciweavers

5675 search results - page 84 / 1135
» Exploiting Chaos for Computation
Sort
View
CCS
2007
ACM
15 years 1 months ago
Analyzing network traffic to detect self-decrypting exploit code
Remotely-launched software exploits are a common way for attackers to intrude into vulnerable computer systems. As detection techniques improve, remote exploitation techniques are...
Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Pu...
DAC
2005
ACM
15 years 11 months ago
Exploiting suspected redundancy without proving it
We present several improvements to general-purpose sequential redundancy removal. First, we propose using a robust variety of synergistic transformation and verification algorithm...
Hari Mony, Jason Baumgartner, Viresh Paruthi, Robe...
ECIR
2009
Springer
15 years 7 months ago
Exploiting Flickr Tags and Groups for Finding Landmark Photos
Many people take pictures of different city landmarks and post them to photo-sharing systems like Flickr. They also add tags and place photos in Flickr groups, created around parti...
Rabeeh Abbasi, Sergey Chernov, Wolfgang Nejdl, Ral...
ICCD
2005
IEEE
127views Hardware» more  ICCD 2005»
15 years 6 months ago
Using Scratchpad to Exploit Object Locality in Java
Performance of modern computers is tied closely to the effective use of cache because of the continually increasing speed discrepancy between processors and main memory. We demons...
Carl S. Lebsack, J. Morris Chang
ICDIM
2007
IEEE
15 years 4 months ago
Exploiting multi-evidence from multiple user's interests to personalizing information retrieval
The goal of personalization in information retrieval is to tailor the search engine results to the specific goals, preferences and general interests of the users. We propose a no...
Lynda Tamine-Lechani, Mohand Boughanem, Nesrine Ze...