Sciweavers

1804 search results - page 327 / 361
» Towards P2P Information Systems
Sort
View
JMLR
2010
185views more  JMLR 2010»
14 years 4 months ago
HMMPayl: an application of HMM to the analysis of the HTTP Payload
Zero-days attacks are one of the most dangerous threats against computer networks. These, by definition, are attacks never seen before. Thus, defense tools based on a database of ...
Davide Ariu, Giorgio Giacinto

Publication
283views
13 years 8 months ago
Security and Surveillance
Human eyes are highly efficient devices for scanning through a large quantity of low-level visual sensory data and delivering selective information to one’s brain for high-level...
Shaogang Gong, Chen Change Loy, Tao Xiang
WWW
2008
ACM
15 years 10 months ago
LocalSavvy: aggregating local points of view about news issues
The web has become an important medium for news delivery and consumption. Fresh content about a variety of topics, events, and places is constantly being created and published on ...
Jiahui Liu, Larry Birnbaum
KDD
2009
ACM
209views Data Mining» more  KDD 2009»
15 years 10 months ago
Collective annotation of Wikipedia entities in web text
To take the first step beyond keyword-based search toward entity-based search, suitable token spans ("spots") on documents must be identified as references to real-world...
Sayali Kulkarni, Amit Singh, Ganesh Ramakrishnan, ...
SIGIR
2009
ACM
15 years 4 months ago
Detecting spammers and content promoters in online video social networks
A number of online video social networks, out of which YouTube is the most popular, provides features that allow users to post a video as a response to a discussion topic. These f...
Fabrício Benevenuto, Tiago Rodrigues, Virg&...