Sciweavers

488 search results - page 92 / 98
» Introduction to Computational Advertising
Sort
View
RAID
2010
Springer
13 years 9 months ago
Detecting the Onset of Infection for Secure Hosts
Abstract. Software flaws in applications such as a browser may be exploited by attackers to launch drive-by-download (DBD), which has become the major vector of malware infection....
Kui Xu, Qiang Ma, Danfeng (Daphne) Yao
UM
2010
Springer
13 years 8 months ago
Mobile Web Profiling: A Study of Off-Portal Surfing Habits of Mobile Users
Abstract. The World Wide Web has provided users with the opportunity to access from any computer the largest set of information ever existing. Researchers have analyzed how such us...
Daniel Olmedilla, Enrique Frías-Martí...
WWW
2011
ACM
13 years 5 months ago
An expressive mechanism for auctions on the web
Auctions are widely used on the Web. Applications range from internet advertising to platforms such as eBay. In most of these applications the auctions in use are single/multi-ite...
Paul Dütting, Monika Henzinger, Ingmar Weber
ISCA
2011
IEEE
269views Hardware» more  ISCA 2011»
13 years 2 months ago
Power management of online data-intensive services
Much of the success of the Internet services model can be attributed to the popularity of a class of workloads that we call Online Data-Intensive (OLDI) services. These workloads ...
David Meisner, Christopher M. Sadler, Luiz Andr&ea...
IACR
2011
158views more  IACR 2011»
12 years 10 months ago
Can Homomorphic Encryption be Practical?
Abstract. The prospect of outsourcing an increasing amount of data storage and management to cloud services raises many new privacy concerns for individuals and businesses alike. T...
Kristin Lauter, Michael Naehrig, Vinod Vaikuntanat...