Sciweavers

1407 search results - page 222 / 282
» Cognition without content
Sort
View
RAID
2010
Springer
13 years 8 months ago
Detecting the Onset of Infection for Secure Hosts
Abstract. Software flaws in applications such as a browser may be exploited by attackers to launch drive-by-download (DBD), which has become the major vector of malware infection....
Kui Xu, Qiang Ma, Danfeng (Daphne) Yao
PLDI
2011
ACM
13 years 24 days ago
Language-independent sandboxing of just-in-time compilation and self-modifying code
When dealing with dynamic, untrusted content, such as on the Web, software behavior must be sandboxed, typically through use of a language like JavaScript. However, even for such ...
Jason Ansel, Petr Marchenko, Úlfar Erlingss...
MMSYS
2012
199views more  MMSYS 2012»
12 years 5 months ago
AngelCast: cloud-based peer-assisted live streaming using optimized multi-tree construction
Increasingly, commercial content providers (CPs) offer streaming and IPTV solutions that leverage an underlying peerto-peer (P2P) stream distribution architecture. The use of P2P...
Raymond Sweha, Vatche Ishakian, Azer Bestavros
WSDM
2012
ACM
301views Data Mining» more  WSDM 2012»
12 years 5 months ago
Learning evolving and emerging topics in social media: a dynamic nmf approach with temporal regularization
As massive repositories of real-time human commentary, social media platforms have arguably evolved far beyond passive facilitation of online social interactions. Rapid analysis o...
Ankan Saha, Vikas Sindhwani
PAMI
2012
12 years 12 days ago
IntentSearch: Capturing User Intention for One-Click Internet Image Search
—Web-scale image search engines (e.g. Google Image Search, Bing Image Search) mostly rely on surrounding text features. It is difficult for them to interpret users’ search int...
Xiaoou Tang, Ke Liu, Jingyu Cui, Fang Wen, Xiaogan...