Sciweavers

8808 search results - page 1633 / 1762
» Process Change Patterns
Sort
View
WWW
2010
ACM
15 years 5 months ago
Large-scale bot detection for search engines
In this paper, we propose a semi-supervised learning approach for classifying program (bot) generated web search traffic from that of genuine human users. The work is motivated by...
Hongwen Kang, Kuansan Wang, David Soukal, Fritz Be...
WISEC
2010
ACM
15 years 5 months ago
pBMDS: a behavior-based malware detection system for cellphone devices
Computing environments on cellphones, especially smartphones, are becoming more open and general-purpose, thus they also become attractive targets of malware. Cellphone malware no...
Liang Xie, Xinwen Zhang, Jean-Pierre Seifert, Senc...
HICSS
2010
IEEE
185views Biometrics» more  HICSS 2010»
15 years 4 months ago
Concurrent Architecture for Automated Malware Classification
This paper introduces a new architecture for automating the generalization of program structure and the recognition of common patterns in the area of malware analysis. By using ma...
Timothy Daly, Luanne Burns
WEA
2010
Springer
284views Algorithms» more  WEA 2010»
15 years 4 months ago
Paging Multiple Users in Cellular Network: Yellow Page and Conference Call Problems
Abstract. Mobile users are roaming in a zone of cells in a cellular network system. The probabilities of each user residing in each cell are known, and all probabilities are indepe...
Amotz Bar-Noy, Panagiotis Cheilaris, Yi Feng 0002
WSDM
2009
ACM
138views Data Mining» more  WSDM 2009»
15 years 4 months ago
Adaptive subjective triggers for opinionated document retrieval
This paper proposes a novel application of a statistical language model to opinionated document retrieval targeting weblogs (blogs). In particular, we explore the use of the trigg...
Kazuhiro Seki, Kuniaki Uehara
« Prev « First page 1633 / 1762 Last » Next »