Sciweavers

4716 search results - page 870 / 944
» Iterative-free program analysis
Sort
View
144
Voted
ICSE
2008
IEEE-ACM
16 years 3 months ago
Static detection of cross-site scripting vulnerabilities
Web applications support many of our daily activities, but they often have security problems, and their accessibility makes them easy to exploit. In cross-site scripting (XSS), an...
Gary Wassermann, Zhendong Su
119
Voted
WWW
2008
ACM
16 years 3 months ago
Characterizing typical and atypical user sessions in clickstreams
Millions of users retrieve information from the Internet using search engines. Mining these user sessions can provide valuable information about the quality of user experience and...
Narayanan Sadagopan, Jie Li
122
Voted
MOBIHOC
2009
ACM
16 years 3 months ago
Delay and effective throughput of wireless scheduling in heavy traffic regimes: vacation model for complexity
Distributed scheduling algorithms for wireless ad hoc networks have received substantial attention over the last decade. The complexity levels of these algorithms span a wide spec...
Yung Yi, Junshan Zhang, Mung Chiang
142
Voted
STOC
2004
ACM
145views Algorithms» more  STOC 2004»
16 years 2 months ago
Using mixture models for collaborative filtering
A collaborative filtering system at an e-commerce site or similar service uses data about aggregate user behavior to make recommendations tailored to specific user interests. We d...
Jon M. Kleinberg, Mark Sandler
123
Voted
ICALP
2009
Springer
16 years 2 months ago
Learning Halfspaces with Malicious Noise
We give new algorithms for learning halfspaces in the challenging malicious noise model, where an adversary may corrupt both the labels and the underlying distribution of examples....
Adam R. Klivans, Philip M. Long, Rocco A. Servedio