Sciweavers

12766 search results - page 2512 / 2554
» collective
Sort
View
WWW
2011
ACM
14 years 6 months ago
Prophiler: a fast filter for the large-scale detection of malicious web pages
Malicious web pages that host drive-by-download exploits have become a popular means for compromising hosts on the Internet and, subsequently, for creating large-scale botnets. In...
Davide Canali, Marco Cova, Giovanni Vigna, Christo...
WWW
2011
ACM
14 years 6 months ago
Network bucket testing
Bucket testing, also known as A/B testing, is a practice that is widely used by on-line sites with large audiences: in a simple version of the methodology, one evaluates a new fea...
Lars Backstrom, Jon M. Kleinberg
WWW
2011
ACM
14 years 6 months ago
Filtering microblogging messages for social TV
Social TV was named one of the ten most important emerging technologies in 2010 by the MIT Technology Review. Manufacturers of set-top boxes and televisions have recently started ...
Ovidiu Dan, Junlan Feng, Brian D. Davison
IJDAR
2011
214views more  IJDAR 2011»
14 years 6 months ago
SCUT-COUCH2009 - a comprehensive online unconstrained Chinese handwriting database and benchmark evaluation
: A comprehensive online unconstrained Chinese handwriting dataset, SCUT-COUCH2009, is introduced in this paper. As a revision of SCUT-COUCH2008 [1], the SCUT-COUCH2009 database co...
Lianwen Jin, Yan Gao, Gang Liu, Yunyang Li, Kai Di...
CORR
2010
Springer
236views Education» more  CORR 2010»
14 years 6 months ago
Precise, Scalable and Online Request Tracing for Multi-tier Services of Black Boxes
As more and more multi-tier services are developed from commercial off-the-shelf components or heterogeneous middleware without source code available, both developers and administr...
Bo Sang, Jianfeng Zhan, Zhihong Zhang, Lei Wang, D...
« Prev « First page 2512 / 2554 Last » Next »