Sciweavers

561 search results - page 74 / 113
» Inferring better contracts
Sort
View
NDSS
2006
IEEE
14 years 1 months ago
Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks
The custom, ad hoc nature of web applications makes learning-based anomaly detection systems a suitable approach to provide early warning about the exploitation of novel vulnerabi...
William K. Robertson, Giovanni Vigna, Christopher ...
IMC
2006
ACM
14 years 1 months ago
Finding diversity in remote code injection exploits
Remote code injection exploits inflict a significant societal cost, and an active underground economy has grown up around these continually evolving attacks. We present a method...
Justin Ma, John Dunagan, Helen J. Wang, Stefan Sav...
BIBE
2005
IEEE
115views Bioinformatics» more  BIBE 2005»
14 years 1 months ago
GOMIT: A Generic and Adaptive Annotation Algorithm Based on Gene Ontology Term Distributions
We address the issue of providing highly informative annotations using information revealed by the structured vocabularies of Gene Ontology (GO). For a target, a set of candidate ...
In-Yee Lee, Jan-Ming Ho, Ming-Syan Chen
JCDL
2005
ACM
95views Education» more  JCDL 2005»
14 years 1 months ago
Link prediction approach to collaborative filtering
Recommender systems can provide valuable services in a digital library environment, as demonstrated by its commercial success in book, movie, and music industries. One of the most...
Zan Huang, Xin Li, Hsinchun Chen
MM
2005
ACM
175views Multimedia» more  MM 2005»
14 years 1 months ago
Towards context-aware face recognition
In this paper, we focus on the use of context-aware, collaborative filtering, machine-learning techniques that leverage automatically sensed and inferred contextual metadata toget...
Marc Davis, Michael Smith, John F. Canny, Nathan G...