Compared to attacks against end hosts, Denial of Service (DoS) attacks against the Internet infrastructure such as those targeted at routers can be more devastating due to their g...
Search logs, which contain rich and up-to-date information about users' needs and preferences, have become a critical data source for search engines. Recently, more and more ...
— Supporting user interactivity in peer-to-peer streaming systems is challenging. VCR-like operations, such as random seek, pause, fast forward and rewind, require timely P2P ove...
Abstract—We present a method for modeling, and automatically inferring, the current interest of a user in search advertising. Our task is complementary to that of predicting ad r...
Qi Guo, Eugene Agichtein, Charles L. A. Clarke, Az...
— Countering Distributed Denial of Service (DDoS) attacks is becoming ever more challenging with the vast resources and techniques increasingly available to attackers. In this pa...
Supranamaya Ranjan, Ram Swaminathan, Mustafa Uysal...