Sciweavers

6293 search results - page 1114 / 1259
» Information Flow Testing
Sort
View
99
Voted
WWW
2010
ACM
15 years 9 months ago
The anatomy of an ad: structured indexing and retrieval for sponsored search
The core task of sponsored search is to retrieve relevant ads for the user’s query. Ads can be retrieved either by exact match, when their bid term is identical to the query, or...
Michael Bendersky, Evgeniy Gabrilovich, Vanja Josi...
133
Voted
ASPLOS
2010
ACM
15 years 9 months ago
SherLog: error diagnosis by connecting clues from run-time logs
Computer systems often fail due to many factors such as software bugs or administrator errors. Diagnosing such production run failures is an important but challenging task since i...
Ding Yuan, Haohui Mai, Weiwei Xiong, Lin Tan, Yuan...
122
Voted
ETRA
2010
ACM
197views Biometrics» more  ETRA 2010»
15 years 9 months ago
Image ranking with implicit feedback from eye movements
In order to help users navigate an image search system, one could provide explicit information on a small set of images as to which of them are relevant or not to their task. Thes...
David R. Hardoon, Kitsuchart Pasupa
108
Voted
PAM
2010
Springer
15 years 9 months ago
A Learning-Based Approach for IP Geolocation
The ability to pinpoint the geographic location of IP hosts is compelling for applications such as on-line advertising and network attack diagnosis. While prior methods can accurat...
Brian Eriksson, Paul Barford, Joel Sommers, Robert...
127
Voted
SAC
2009
ACM
15 years 9 months ago
SQLProb: a proxy-based architecture towards preventing SQL injection attacks
SQL injection attacks (SQLIAs) consist of maliciously crafted SQL inputs, including control code, used against Databaseconnected Web applications. To curtail the attackers’ abil...
Anyi Liu, Yi Yuan, Duminda Wijesekera, Angelos Sta...
« Prev « First page 1114 / 1259 Last » Next »