Sciweavers

122 search results - page 18 / 25
» Exploiting efficient data mining techniques to enhance intru...
Sort
View
ISW
2009
Springer
14 years 1 months ago
F3ildCrypt: End-to-End Protection of Sensitive Information in Web Services
The frequency and severity of a number of recent intrusions involving data theft and leakages has shown that online users’ trust, voluntary or not, in the ability of third partie...
Matthew Burnside, Angelos D. Keromytis
IROS
2009
IEEE
145views Robotics» more  IROS 2009»
14 years 1 months ago
Utilizing prior information to enhance self-supervised aerial image analysis for extracting parking lot structures
Abstract— Road network information (RNI) simplifies autonomous driving by providing strong priors about driving environments. Its usefulness has been demonstrated in the DARPA U...
Young-Woo Seo, Chris Urmson
OSDI
2004
ACM
14 years 7 months ago
Enhancing Server Availability and Security Through Failure-Oblivious Computing
We present a new technique, failure-oblivious computing, that enables servers to execute through memory errors without memory corruption. Our safe compiler for C inserts checks th...
Martin C. Rinard, Cristian Cadar, Daniel Dumitran,...
SAC
2006
ACM
14 years 21 days ago
A privacy preserving web recommender system
In this paper we propose a recommender system that helps users to navigate though the Web by providing dynamically generated links to pages that have not yet been visited and are ...
Ranieri Baraglia, Claudio Lucchese, Salvatore Orla...
SIGMOD
2006
ACM
219views Database» more  SIGMOD 2006»
14 years 6 months ago
Modeling skew in data streams
Data stream applications have made use of statistical summaries to reason about the data using nonparametric tools such as histograms, heavy hitters, and join sizes. However, rela...
Flip Korn, S. Muthukrishnan, Yihua Wu