Sciweavers

2956 search results - page 287 / 592
» Targeted Data Prefetching
Sort
View
SEMCO
2007
IEEE
15 years 10 months ago
Intelligent Parsing of Scanned Volumes for Web Based Archives
The proliferation of digital libraries and the large amount of existing documents raise important issues in efficient handling of documents. Printed texts in documents need to be...
Xiaonan Lu, James Ze Wang, C. Lee Giles
ICMCS
2006
IEEE
344views Multimedia» more  ICMCS 2006»
15 years 9 months ago
Pattern Mining in Visual Concept Streams
Pattern mining algorithms are often much easier applied than quantitatively assessed. In this paper we address the pattern evaluation problem by looking at both the capability of ...
Lexing Xie, Shih-Fu Chang
INFOCOM
2006
IEEE
15 years 9 months ago
The Index Poisoning Attack in P2P File Sharing Systems
— P2P file-sharing systems have indexes, which users search to find locations of desired titles. In the index poisoning attack, the attacker inserts massive numbers of bogus re...
Jian Liang, Naoum Naoumov, Keith W. Ross
MICRO
2006
IEEE
155views Hardware» more  MICRO 2006»
15 years 9 months ago
In-Network Cache Coherence
With the trend towards increasing number of processor cores in future chip architectures, scalable directory-based protocols for maintaining cache coherence will be needed. Howeve...
Noel Eisley, Li-Shiuan Peh, Li Shang
SP
2006
IEEE
234views Security Privacy» more  SP 2006»
15 years 9 months ago
Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities (Short Paper)
The number and the importance of Web applications have increased rapidly over the last years. At the same time, the quantity and impact of security vulnerabilities in such applica...
Nenad Jovanovic, Christopher Krügel, Engin Ki...