Sciweavers

2613 search results - page 520 / 523
» Active Software Artifacts
Sort
View
ICMLC
2010
Springer
13 years 5 months ago
Initiated language learning machine with multi-media and speech-recognition techniques
: Facing the 21st century the age of exploration-increasing of all kinds of knowledge and quickly development of information, how to promote the competition potential of our citize...
Dong-Liang Lee, Chun-Liang Hsu, Sheng-Yuan Yang, W...
INFOCOM
2010
IEEE
13 years 5 months ago
TopBT: A Topology-Aware and Infrastructure-Independent BitTorrent Client
—BitTorrent (BT) has carried out a significant and continuously increasing portion of Internet traffic. While several designs have been recently proposed and implemented to imp...
Shansi Ren, Enhua Tan, Tian Luo, Songqing Chen, Le...
ACL
2010
13 years 5 months ago
Hunting for the Black Swan: Risk Mining from Text
In the business world, analyzing and dealing with risk permeates all decisions and actions. However, to date, risk identification, the first step in the risk management cycle, has...
Jochen L. Leidner, Frank Schilder
ACSAC
2010
IEEE
13 years 5 months ago
Cujo: efficient detection and prevention of drive-by-download attacks
The JavaScript language is a core component of active and dynamic web content in the Internet today. Besides its great success in enhancing web applications, however, JavaScript p...
Konrad Rieck, Tammo Krueger, Andreas Dewald
INFOCOM
2010
IEEE
13 years 5 months ago
Measurement and Diagnosis of Address Misconfigured P2P Traffic
Misconfigured P2P traffic caused by bugs in volunteer-developed P2P software or by attackers is prevalent. It influences both end users and ISPs. In this paper, we discover and stu...
Zhichun Li, Anup Goyal, Yan Chen, Aleksandar Kuzma...