Sciweavers

3678 search results - page 698 / 736
» Personalization of Queries in Database Systems
Sort
View
MOBISYS
2008
ACM
16 years 5 months ago
Behavioral detection of malware on mobile handsets
A novel behavioral detection framework is proposed to detect mobile worms, viruses and Trojans, instead of the signature-based solutions currently available for use in mobile devi...
Abhijit Bose, Xin Hu, Kang G. Shin, Taejoon Park
MIR
2010
ACM
176views Multimedia» more  MIR 2010»
16 years 8 days ago
Object-based tag propagation for semi-automatic annotation of images
Over the last few years, social network systems have greatly increased users’ involvement in online content creation and annotation. Since such systems usually need to deal with...
Ivan Ivanov, Peter Vajda, Lutz Goldmann, Jong-Seok...
CCS
2009
ACM
16 years 6 days ago
Keep your friends close: the necessity for updating an anomaly sensor with legitimate environment changes
Large-scale distributed systems have dense, complex code-bases that are assumed to perform multiple and inter-dependent tasks while user interaction is present. The way users inte...
Angelos Stavrou, Gabriela F. Cretu-Ciocarlie, Mich...
SEMWEB
2009
Springer
15 years 12 months ago
Cross-lingual Dutch to English alignment using EuroWordNet and Dutch Wikipedia
Abstract. This paper describes a system for linking the thesaurus of the Netherlands Institute for Sound and Vision to English WordNet and dbpedia. We used EuroWordNet, a multiling...
Gosse Bouma
KDD
2010
ACM
272views Data Mining» more  KDD 2010»
15 years 9 months ago
Beyond heuristics: learning to classify vulnerabilities and predict exploits
The security demands on modern system administration are enormous and getting worse. Chief among these demands, administrators must monitor the continual ongoing disclosure of sof...
Mehran Bozorgi, Lawrence K. Saul, Stefan Savage, G...