Sciweavers

446 search results - page 17 / 90
» How was your day
Sort
View
CCS
2009
ACM
14 years 2 months ago
Your botnet is my botnet: analysis of a botnet takeover
Botnets, networks of malware-infected machines that are controlled by an adversary, are the root cause of a large number of security problems on the Internet. A particularly sophi...
Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, ...
CORR
2010
Springer
82views Education» more  CORR 2010»
13 years 7 months ago
Spying the World from your Laptop -- Identifying and Profiling Content Providers and Big Downloaders in BitTorrent
This paper presents a set of exploits an adversary can use to continuously spy on most BitTorrent users of the Internet from a single machine and for a long period of time. Using ...
Stevens Le-Blond, Arnaud Legout, Fabrice Le Fessan...
SIGUCCS
2000
ACM
14 years 2 days ago
Creating a Help Center from Scratch: A Recipe for Success
Creating a university Help Center from scratch can be a challenging yet very rewarding experience for an IT professional. Buying computers, building networks, and installing softw...
Patrick McKoen
AIIA
2007
Springer
14 years 1 months ago
User Modelling for Personalized Question Answering
In this paper, we address the problem of personalization in question answering (QA). We describe the personalization component of YourQA, our web-based QA system, which creates ind...
Silvia Quarteroni, Suresh Manandhar

Presentation
413views
14 years 7 months ago
Digital Imaging and Communications in Medicine (DICOM)
DICOM WORLD, is your main website for learning, speaking, and discussing DICOM. This includes but not limited to DICOM, PACS, Radiology, DICOM related software, DICOM related devic...
Essa Islam