Sciweavers

885 search results - page 102 / 177
» Large-scale behavioral targeting
Sort
View
RIVF
2007
14 years 11 months ago
Human Heuristics for a Team of Mobile Robots
— This paper is at the crossroad of Cognitive Psychology and AI Robotics. It reports a cross-disciplinary project concerned about implementing human heuristics within autonomous ...
Charles Tijus, Elisabetta Zibetti, V. Besson, Nico...
MMNS
2001
138views Multimedia» more  MMNS 2001»
14 years 11 months ago
Study of TCP and UDP Flows in a Differentiated Services Network Using Two Markers System
There are two cruxes of issues identified in differentiated services (diffserv) networks: One is TCP dynamics over Assured Services, and the other is the interaction of TCP and UDP...
Sung-Hyuck Lee, Seung-Joon Seok, Seung-Jin Lee, Ch...
WISES
2004
14 years 11 months ago
Using Triggers to Find Significant Events During Monitoring of Real-Time Systems
-- A main prerequisite for the successful development of real-time systems is the capability for debugging and monitoring of these systems. The debugging of real-time systems is mo...
Idriz Smaili
CCR
2010
171views more  CCR 2010»
14 years 10 months ago
Fighting online click-fraud using bluff ads
Online advertising is currently the richest source of revenue for many Internet giants. The increased number of online businesses, specialized websites and modern profiling techni...
Hamed Haddadi
INFOCOM
2010
IEEE
14 years 8 months ago
Malicious Shellcode Detection with Virtual Memory Snapshots
Abstract—Malicious shellcodes are segments of binary code disguised as normal input data. Such shellcodes can be injected into a target process’s virtual memory. They overwrite...
Boxuan Gu, Xiaole Bai, Zhimin Yang, Adam C. Champi...