Sciweavers

732 search results - page 137 / 147
» Evaluation of Feature Based Modelling in Subtraction
Sort
View
KDD
2010
ACM
272views Data Mining» more  KDD 2010»
13 years 11 months ago
Beyond heuristics: learning to classify vulnerabilities and predict exploits
The security demands on modern system administration are enormous and getting worse. Chief among these demands, administrators must monitor the continual ongoing disclosure of sof...
Mehran Bozorgi, Lawrence K. Saul, Stefan Savage, G...
IPM
2007
149views more  IPM 2007»
13 years 7 months ago
Web page title extraction and its application
This paper is concerned with automatic extraction of titles from the bodies of HTML documents (web pages). Titles of HTML documents should be correctly defined in the title fields...
Yewei Xue, Yunhua Hu, Guomao Xin, Ruihua Song, Shu...
GIS
2010
ACM
13 years 6 months ago
Detecting nearly duplicated records in location datasets
The quality of a local search engine, such as Google and Bing Maps, heavily relies on its geographic datasets. Typically, these datasets are obtained from multiple sources, e.g., ...
Yu Zheng, Xixuan Fen, Xing Xie, Shuang Peng, James...
WWW
2010
ACM
14 years 2 months ago
Privacy wizards for social networking sites
Privacy is an enormous problem in online social networking sites. While sites such as Facebook allow users fine-grained control over who can see their profiles, it is difficult ...
Lujun Fang, Kristen LeFevre
VTC
2006
IEEE
121views Communications» more  VTC 2006»
14 years 1 months ago
Multiobjective QoS-Oriented Planning for Indoor Wireless LANs
Abstract— This paper describes an automatic wireless LAN access points planning approach based on a multicriteria modelling and solving. A realistic and efficient wLAN planning ...
Katia Jaffrès-Runser, Jean-Marie Gorce, St&...