Sciweavers

6240 search results - page 1088 / 1248
» From Internet Information Searching to Information Summarizi...
Sort
View
ICWS
2009
IEEE
15 years 11 months ago
Deactivation of Unwelcomed Deep Web Extraction Services through Random Injection
Websites serve content both through Web Services as well as through user-viewable webpages. While the consumers of web-services are typically ‘machines’, webpages are meant fo...
Varun Bhagwan, Tyrone Grandison
SOFSEM
2009
Springer
15 years 10 months ago
When Analysis Fails: Heuristic Mechanism Design via Self-correcting Procedures
Abstract. Computational mechanism design (CMD) seeks to understand how to design game forms that induce desirable outcomes in multiagent systems despite private information, self-i...
David C. Parkes
103
Voted
ACIIDS
2009
IEEE
122views Database» more  ACIIDS 2009»
15 years 8 months ago
How to Maximize User Satisfaction Degree in Multi-service IP Networks
—Bandwidth allocation is a fundamental problem in communication networks. With current network moving towards the Future Internet model, the problem is further intensified as net...
Huy Anh Nguyen, Tam Van Nguyen, Deokjai Choi
CCS
2009
ACM
15 years 8 months ago
Your botnet is my botnet: analysis of a botnet takeover
Botnets, networks of malware-infected machines that are controlled by an adversary, are the root cause of a large number of security problems on the Internet. A particularly sophi...
Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, ...
MEDES
2009
ACM
15 years 8 months ago
Geographic data integration to support web GIS development
Although research in data integration has become one of the main issues in [6], geographic data integration is still a laborious and complicated problem, even for specialists. Geo...
André Rocha Coimbra
« Prev « First page 1088 / 1248 Last » Next »