Sciweavers

2732 search results - page 542 / 547
» SIGA, a System to Manage Information Retrieval Evaluations
Sort
View
INFOSCALE
2009
ACM
15 years 4 months ago
A Lightweight Mechanism to Mitigate Application Layer DDoS Attacks
Abstract. Application layer DDoS attacks, to which network layer solutions is not applicable as attackers are indistinguishable based on packets or protocols, prevent legitimate us...
Jie Yu, Chengfang Fang, Liming Lu, Zhoujun Li
MOBISYS
2008
ACM
15 years 9 months ago
Behavioral detection of malware on mobile handsets
A novel behavioral detection framework is proposed to detect mobile worms, viruses and Trojans, instead of the signature-based solutions currently available for use in mobile devi...
Abhijit Bose, Xin Hu, Kang G. Shin, Taejoon Park
106
Voted
ICSE
2008
IEEE-ACM
15 years 10 months ago
Impact analysis of database schema changes
We propose static program analysis techniques for identifying the impact of relational database schema changes upon object-oriented applications. We use dataflow analysis to extra...
Andy Maule, Wolfgang Emmerich, David S. Rosenblum
WAIM
2009
Springer
15 years 4 months ago
Personalized Delivery of On-Line Search Advertisement Based on User Interests
Search engine advertising has become the main stream of online advertising system. In current search engine advertising systems, all users will get the same advertisement rank if t...
Guangyi Xiao, Zhiguo Gong
95
Voted
ISCA
2007
IEEE
167views Hardware» more  ISCA 2007»
15 years 3 months ago
New cache designs for thwarting software cache-based side channel attacks
Software cache-based side channel attacks are a serious new class of threats for computers. Unlike physical side channel attacks that mostly target embedded cryptographic devices,...
Zhenghong Wang, Ruby B. Lee