Sciweavers

12745 search results - page 2383 / 2549
» Automating test automation
Sort
View
149
Voted
ICC
2009
IEEE
150views Communications» more  ICC 2009»
15 years 10 months ago
Modeling Human Behavior for Defense Against Flash-Crowd Attacks
—Flash-crowd attacks are the most vicious form of distributed denial of service (DDoS). They flood the victim with service requests generated from numerous bots. Attack requests...
Georgios Oikonomou, Jelena Mirkovic
127
Voted
ICEIS
2009
IEEE
15 years 10 months ago
Semi-supervised Information Extraction from Variable-length Web-page Lists
We propose two methods for constructing automated programs for extraction of information from a class of web pages that are very common and of high practical significance - varia...
Daniel Nikovski, Alan Esenther, Akihiro Baba
129
Voted
INFOCOM
2009
IEEE
15 years 10 months ago
Mining the Web and the Internet for Accurate IP Address Geolocations
In this paper, we present Structon, a novel approach that uses Web mining together with inference and IP traceroute to geolocate IP addresses with significantly better accuracy t...
Chuanxiong Guo, Yunxin Liu, Wenchao Shen, Helen J....
167
Voted
LICS
2009
IEEE
15 years 10 months ago
The Structure of First-Order Causality
Game semantics describe the interactive behavior of proofs by interpreting formulas as games on which proofs induce strategies. Such a semantics is introduced here for capturing d...
Samuel Mimram
121
Voted
LICS
2009
IEEE
15 years 10 months ago
Qualitative Determinacy and Decidability of Stochastic Games with Signals
We consider the standard model of finite two-person zero-sum stochastic games with signals. We are interested in the existence of almost-surely winning or positively winning stra...
Nathalie Bertrand, Blaise Genest, Hugo Gimbert
« Prev « First page 2383 / 2549 Last » Next »