Sciweavers

59 search results - page 3 / 12
» Investigating Two Different Approaches for Encrypted Traffic...
Sort
View
ICPR
2008
IEEE
14 years 9 months ago
Bag-of-visual-words models for adult image classification and filtering
We present a method to classify images into different categories of pornographic content to create a system for filtering pornographic images from network traffic. Although differ...
Hermann Ney, Lexi Pimenidis, Thomas Deselaers
HICSS
2005
IEEE
117views Biometrics» more  HICSS 2005»
14 years 1 months ago
Movie Review Mining: a Comparison between Supervised and Unsupervised Classification Approaches
Web content mining is intended to help people discover valuable information from large amount of unstructured data on the web. Movie review mining classifies movie reviews into tw...
Pimwadee Chaovalit, Lina Zhou
CCR
2008
118views more  CCR 2008»
13 years 7 months ago
A generic language for application-specific flow sampling
Flow records gathered by routers provide valuable coarse-granularity traffic information for several measurement-related network applications. However, due to high volumes of traf...
Harsha V. Madhyastha, Balachander Krishnamurthy
CONEXT
2009
ACM
13 years 8 months ago
Exploiting dynamicity in graph-based traffic analysis: techniques and applications
Network traffic can be represented by a Traffic Dispersion Graph (TDG) that contains an edge between two nodes that send a particular type of traffic (e.g., DNS) to one another. T...
Marios Iliofotou, Michalis Faloutsos, Michael Mitz...
CHI
2009
ACM
14 years 8 months ago
Two studies of opportunistic programming: interleaving web foraging, learning, and writing code
This paper investigates the role of online resources in problem solving. We look specifically at how programmers--an exemplar form of knowledge workers--opportunistically interlea...
Joel Brandt, Philip J. Guo, Joel Lewenstein, Mira ...