Sciweavers

1362 search results - page 233 / 273
» From Research to Business: The Web of Linked Data
Sort
View
ACSAC
2009
IEEE
14 years 5 months ago
FIRE: FInding Rogue nEtworks
For many years, online criminals have been able to conduct their illicit activities by masquerading behind disreputable Internet Service Providers (ISPs). For example, organizatio...
Brett Stone-Gross, Christopher Kruegel, Kevin C. A...
ISSRE
2003
IEEE
14 years 3 months ago
A Framework for Tamper Detection Marking of Mobile Applications
Today’s applications are highly mobile; we download software from the Internet, machine executable code arrives attached to electronic mail, and Java applets increase the functi...
Mike Jochen, Lisa M. Marvel, Lori L. Pollock
ACL
2011
13 years 1 months ago
Knowledge-Based Weak Supervision for Information Extraction of Overlapping Relations
Information extraction (IE) holds the promise of generating a large-scale knowledge base from the Web’s natural language text. Knowledge-based weak supervision, using structured...
Raphael Hoffmann, Congle Zhang, Xiao Ling, Luke S....
GIS
2009
ACM
14 years 11 months ago
Spatio-Textual Spreadsheets: Geotagging via Spatial Coherence
The spatio-textual spreadsheet is a conventional spreadsheet where spatial attribute values are specified textually. Techniques are presented to automatically find the textually-s...
Hanan Samet, Jagan Sankaranarayanan, Jon Sperling,...
INFOCOM
2002
IEEE
14 years 3 months ago
TCP-SMO: Extending TCP to Support Medium-Scale Multicast Applications
Abstract—Scalable reliable multicast protocols have been a focus of recent research, tackling the problem of efficient reliable data delivery to an arbitrarily large number of r...
Sam Liang, David R. Cheriton