Sciweavers

4382 search results - page 748 / 877
» Query by Semantic Example
Sort
View
138
Voted
WWW
2011
ACM
14 years 9 months ago
Heat-seeking honeypots: design and experience
Many malicious activities on the Web today make use of compromised Web servers, because these servers often have high pageranks and provide free resources. Attackers are therefore...
John P. John, Fang Yu, Yinglian Xie, Arvind Krishn...
147
Voted
CIDR
2011
223views Algorithms» more  CIDR 2011»
14 years 6 months ago
No bits left behind
One of the key tenets of database system design is making efficient use of storage and memory resources. However, existing database system implementations are actually extremely ...
Eugene Wu 0002, Carlo Curino, Samuel Madden
NAR
2011
182views Computer Vision» more  NAR 2011»
14 years 5 months ago
PAIR: the predicted Arabidopsis interactome resource
The predicted Arabidopsis interactome resource (PAIR, http://www.cls.zju.edu.cn/pair/), comprised of 5990 experimentally reported molecular interactions in Arabidopsis thaliana to...
Mingzhi Lin, Xueling Shen, Xin Chen
109
Voted
SIGIR
2011
ACM
14 years 5 months ago
Cluster-based fusion of retrieved lists
Methods for fusing document lists that were retrieved in response to a query often use retrieval scores (or ranks) of documents in the lists. We present a novel probabilistic fusi...
Anna Khudyak Kozorovitzky, Oren Kurland
136
Voted
CSFW
2011
IEEE
14 years 2 months ago
Formal Analysis of Protocols Based on TPM State Registers
—We present a Horn-clause-based framework for analysing security protocols that use platform configuration registers (PCRs), which are registers for maintaining state inside the...
Stéphanie Delaune, Steve Kremer, Mark Dermo...