Sciweavers

1933 search results - page 316 / 387
» Query Containment Using Views
Sort
View
100
Voted
ACSAC
2006
IEEE
15 years 8 months ago
Addressing SMTP-Based Mass-Mailing Activity within Enterprise Networks
Malicious mass-mailing activity on the Internet is a serious and continuing threat that includes mass-mailing worms, spam, and phishing. A mechanism commonly used to deliver such ...
David Whyte, Paul C. van Oorschot, Evangelos Krana...
117
Voted
ACSC
2006
IEEE
15 years 8 months ago
A semantic approach to boost passage retrieval effectiveness for question answering
In the current state of the rapid growth of information resources and the huge number of requests submitted by users to existing information retrieval systems; recently, Question ...
Bahadorreza Ofoghi, John Yearwood, Ranadhir Ghosh
ICMCS
2006
IEEE
153views Multimedia» more  ICMCS 2006»
15 years 8 months ago
RESP: Shortest-Path-Based Cache Replacement in a Transcoding Proxy
In this paper, we discuss the cache replacement policy in a multimedia transcoding proxy. Unlike the cache replacement for conventional web objects, to replace some elements with ...
Hao-Ping Hung, Ming-Syan Chen
KBSE
2006
IEEE
15 years 8 months ago
A Portable Compiler-Integrated Approach to Permanent Checking
Program checking technology is now a mature technology, but is not yet used on a large scale. We identify one cause of this gap in the decoupling of checking tools from the everyd...
Eugen-Nicolae Volanschi
97
Voted
UIST
2006
ACM
15 years 8 months ago
Enabling web browsers to augment web sites' filtering and sorting functionalities
Existing augmentations of web pages are mostly small cosmetic changes (e.g., removing ads) and minor addition of third-party content (e.g., product prices from competing sites). N...
David F. Huynh, Robert C. Miller, David R. Karger