Sciweavers

885 search results - page 153 / 177
» Large-scale behavioral targeting
Sort
View
CCS
2011
ACM
13 years 9 months ago
Cloak and dagger: dynamics of web search cloaking
Cloaking is a common “bait-and-switch” technique used to hide the true nature of a Web site by delivering blatantly different semantic content to different user segments. It i...
David Y. Wang, Stefan Savage, Geoffrey M. Voelker
ICDE
2012
IEEE
227views Database» more  ICDE 2012»
13 years 3 days ago
Temporal Analytics on Big Data for Web Advertising
—“Big Data” in map-reduce (M-R) clusters is often fundamentally temporal in nature, as are many analytics tasks over such data. For instance, display advertising uses Behavio...
Badrish Chandramouli, Jonathan Goldstein, Songyun ...
OSDI
2004
ACM
15 years 10 months ago
Automated Worm Fingerprinting
Network worms are a clear and growing threat to the security of today's Internet-connected hosts and networks. The combination of the Internet's unrestricted connectivit...
Sumeet Singh, Cristian Estan, George Varghese, Ste...
75
Voted
PPPJ
2009
ACM
15 years 4 months ago
Tracking performance across software revisions
Repository-based revision control systems such as CVS, RCS, Subversion, and GIT, are extremely useful tools that enable software developers to concurrently modify source code, man...
Nagy Mostafa, Chandra Krintz
EDBT
2009
ACM
186views Database» more  EDBT 2009»
15 years 4 months ago
Automating the loading of business process data warehouses
Business processes drive the operations of an enterprise. In the past, the focus was primarily on business process design, modeling, and automation. Recently, enterprises have rea...
Malú Castellanos, Alkis Simitsis, Kevin Wil...