Sciweavers

991 search results - page 43 / 199
» Analyzing URL queries
Sort
View
NDSS
2008
IEEE
14 years 4 months ago
Corrupted DNS Resolution Paths: The Rise of a Malicious Resolution Authority
We study and document an important development in how attackers are using Internet resources: the creation of malicious DNS resolution paths. In this growing form of attack, victi...
David Dagon, Niels Provos, Christopher P. Lee, Wen...
JCDL
2006
ACM
143views Education» more  JCDL 2006»
14 years 3 months ago
Categorizing web search results into meaningful and stable categories using fast-feature techniques
When search results against digital libraries and web resources have limited metadata, augmenting them with meaningful and stable category information can enable better overviews ...
Bill Kules, Jack Kustanowitz, Ben Shneiderman
SIGIR
2012
ACM
12 years 11 days ago
Fighting against web spam: a novel propagation method based on click-through data
Combating Web spam is one of the greatest challenges for Web search engines. State-of-the-art anti-spam techniques focus mainly on detecting varieties of spam strategies, such as ...
Chao Wei, Yiqun Liu, Min Zhang, Shaoping Ma, Liyun...
KDD
2004
ACM
168views Data Mining» more  KDD 2004»
14 years 10 months ago
Mining, indexing, and querying historical spatiotemporal data
In many applications that track and analyze spatiotemporal data, movements obey periodic patterns; the objects follow the same routes (approximately) over regular time intervals. ...
Nikos Mamoulis, Huiping Cao, George Kollios, Mario...
VLDB
2004
ACM
134views Database» more  VLDB 2004»
14 years 3 months ago
A Privacy-Preserving Index for Range Queries
Database outsourcing is an emerging data management paradigm which has the potential to transform the IT operations of corporations. In this paper we address privacy threats in da...
Bijit Hore, Sharad Mehrotra, Gene Tsudik