Sciweavers

1585 search results - page 294 / 317
» Automatically optimizing secure computation
Sort
View
WSDM
2010
ACM
315views Data Mining» more  WSDM 2010»
14 years 7 months ago
SBotMiner: Large Scale Search Bot Detection
In this paper, we study search bot traffic from search engine query logs at a large scale. Although bots that generate search traffic aggressively can be easily detected, a large ...
Fang Yu, Yinglian Xie, Qifa Ke
ICWS
2009
IEEE
14 years 7 months ago
Wrap Scientific Applications as WSRF Grid Services Using gRAVI
— Web service models are increasingly being used in the Grid community as way to create distributed applications exposing data and/or applications through self describing interfa...
Kyle Chard, Wei Tan, Joshua Boverhof, Ravi K. Madd...
EUROSYS
2010
ACM
14 years 7 months ago
Reverse Engineering of Binary Device Drivers with RevNIC
This paper presents a technique that helps automate the reverse engineering of device drivers. It takes a closed-source binary driver, automatically reverse engineers the driverâ€...
Vitaly Chipounov, George Candea
IMC
2006
ACM
14 years 4 months ago
Unexpected means of protocol inference
Network managers are inevitably called upon to associate network trafï¬c with particular applications. Indeed, this operation is critical for a wide range of management functions...
Justin Ma, Kirill Levchenko, Christian Kreibich, S...
CIKM
2005
Springer
14 years 3 months ago
MailRank: using ranking for spam detection
Can we use social networks to combat spam? This paper investigates the feasibility of MailRank, a new email ranking and classiï¬cation scheme exploiting the social communication ...
Paul-Alexandru Chirita, Jörg Diederich, Wolfg...