Sciweavers

6293 search results - page 1114 / 1259
» Information Flow Testing
Sort
View
WWW
2010
ACM
15 years 11 months ago
The anatomy of an ad: structured indexing and retrieval for sponsored search
The core task of sponsored search is to retrieve relevant ads for the user’s query. Ads can be retrieved either by exact match, when their bid term is identical to the query, or...
Michael Bendersky, Evgeniy Gabrilovich, Vanja Josi...
145
Voted
ASPLOS
2010
ACM
15 years 10 months ago
SherLog: error diagnosis by connecting clues from run-time logs
Computer systems often fail due to many factors such as software bugs or administrator errors. Diagnosing such production run failures is an important but challenging task since i...
Ding Yuan, Haohui Mai, Weiwei Xiong, Lin Tan, Yuan...
137
Voted
ETRA
2010
ACM
197views Biometrics» more  ETRA 2010»
15 years 10 months ago
Image ranking with implicit feedback from eye movements
In order to help users navigate an image search system, one could provide explicit information on a small set of images as to which of them are relevant or not to their task. Thes...
David R. Hardoon, Kitsuchart Pasupa
124
Voted
PAM
2010
Springer
15 years 10 months ago
A Learning-Based Approach for IP Geolocation
The ability to pinpoint the geographic location of IP hosts is compelling for applications such as on-line advertising and network attack diagnosis. While prior methods can accurat...
Brian Eriksson, Paul Barford, Joel Sommers, Robert...
144
Voted
SAC
2009
ACM
15 years 10 months ago
SQLProb: a proxy-based architecture towards preventing SQL injection attacks
SQL injection attacks (SQLIAs) consist of maliciously crafted SQL inputs, including control code, used against Databaseconnected Web applications. To curtail the attackers’ abil...
Anyi Liu, Yi Yuan, Duminda Wijesekera, Angelos Sta...
« Prev « First page 1114 / 1259 Last » Next »