Sciweavers

595 search results - page 12 / 119
» Session 7: Demonstrations
Sort
View
86
Voted
ACSW
2006
14 years 11 months ago
Experiences in passively detecting session hijacking attacks in IEEE 802.11 networks
Current IEEE 802.11 wireless networks are vulnerable to session hijacking attacks as the existing standards fail to address the lack of authentication of management frames and net...
Rupinder Gill, Jason Smith, Andrew Clark
KDD
2009
ACM
188views Data Mining» more  KDD 2009»
15 years 10 months ago
Mining broad latent query aspects from search sessions
Search queries are typically very short, which means they are often underspecified or have senses that the user did not think of. A broad latent query aspect is a set of keywords ...
Xuanhui Wang, Deepayan Chakrabarti, Kunal Punera
KDD
2009
ACM
245views Data Mining» more  KDD 2009»
15 years 10 months ago
Mining rich session context to improve web search
User browsing information, particularly their non-search related activity, reveals important contextual information on the preferences and the intent of web users. In this paper, ...
Guangyu Zhu, Gilad Mishne
ICPP
2005
IEEE
15 years 3 months ago
Session-Based Adaptive Overload Control for Secure Dynamic Web Applications
As dynamic web content and security capabilities are becoming popular in current web sites, the performance demand on application servers that host the sites is increasing, leadin...
Jordi Guitart, David Carrera, Vicenç Beltra...
NAACL
1994
14 years 11 months ago
Session 10: Government Panel
The Workshop included an extended group of presentations by selected US government agencies and an invited guest from the European Community. These presentations, amplified in the...
Oscar N. Garcia