Sciweavers

119 search results - page 4 / 24
» Explore Exploit Schemes for Web Content Optimization
Sort
View
JCDL
2003
ACM
94views Education» more  JCDL 2003»
14 years 25 days ago
Content Access Characterization in Digital Libraries
To support non-trivial clients, such as data exploration and analysis environments, digital libraries must be able to describe the access modes that their contents support. We pre...
Greg Janee, James Frew, David Valentine
PST
2008
13 years 9 months ago
An Effective Defense against Intrusive Web Advertising
Intrusive Web advertising such as pop-ups and animated layer ads, which distract the user from reading or navigating through the main content of Web pages, is being perceived as a...
Viktor Krammer
ICDE
2003
IEEE
144views Database» more  ICDE 2003»
14 years 9 months ago
Scalable template-based query containment checking for web semantic caches
Semantic caches, originally proposed for client-server database systems, are being recently deployed to accelerate the serving of dynamic web content by transparently caching data...
Khalil Amiri, Sanghyun Park, Renu Tewari, Sriram P...
GECCO
2005
Springer
114views Optimization» more  GECCO 2005»
14 years 1 months ago
Exploiting disruption aversion to control code bloat
The authors employ multiple crossovers as a novel natural extension to crossovers as a mixing operator. They use this as a framework to explore the ideas of code growth. Empirical...
Jason Stevens, Robert B. Heckendorn, Terence Soule
ICMCS
2006
IEEE
149views Multimedia» more  ICMCS 2006»
14 years 1 months ago
Authenticating Multimedia Transmitted Over Wireless Networks: A Content-Aware Stream-Level Approach
We propose in this paper a novel content-aware stream-level approach to authenticating multimedia data transmitted over wireless networks. The proposed approach is fundamentally d...
Zhi Li, Yong Lian, Qibin Sun, Chang Chen