Sciweavers

5962 search results - page 1061 / 1193
» Working with Patterns and Code
Sort
View
137
Voted
SOSP
2005
ACM
16 years 13 days ago
FS2: dynamic data replication in free disk space for improving disk performance and energy consumption
Disk performance is increasingly limited by its head positioning latencies, i.e., seek time and rotational delay. To reduce the head positioning latencies, we propose a novel tech...
Hai Huang, Wanda Hung, Kang G. Shin
126
Voted
WWW
2010
ACM
15 years 10 months ago
Large-scale bot detection for search engines
In this paper, we propose a semi-supervised learning approach for classifying program (bot) generated web search traffic from that of genuine human users. The work is motivated by...
Hongwen Kang, Kuansan Wang, David Soukal, Fritz Be...
123
Voted
WISEC
2010
ACM
15 years 10 months ago
pBMDS: a behavior-based malware detection system for cellphone devices
Computing environments on cellphones, especially smartphones, are becoming more open and general-purpose, thus they also become attractive targets of malware. Cellphone malware no...
Liang Xie, Xinwen Zhang, Jean-Pierre Seifert, Senc...
134
Voted
HICSS
2010
IEEE
171views Biometrics» more  HICSS 2010»
15 years 10 months ago
Developing Reliable Measures of Privacy Management within Social Networking Sites
Social networking sites and other examples of online social spaces have greatly expanded their members’ opportunities for self expression and social interaction, while creating ...
Catherine Dwyer, Starr Roxanne Hiltz, Marshall Sco...
115
Voted
CHI
2010
ACM
15 years 10 months ago
Signed networks in social media
Relations between users on social media sites often reflect a mixture of positive (friendly) and negative (antagonistic) interactions. In contrast to the bulk of research on soci...
Jure Leskovec, Daniel P. Huttenlocher, Jon M. Klei...
« Prev « First page 1061 / 1193 Last » Next »