Sciweavers

2084 search results - page 352 / 417
» Knowledge Exploitation from the Web
Sort
View
EUROSYS
2008
ACM
14 years 6 months ago
Manageable fine-grained information flow
The continuing frequency and seriousness of security incidents underlines the importance of application security. Decentralized information flow control (DIFC), a promising tool ...
Petros Efstathopoulos, Eddie Kohler
TDSC
2010
191views more  TDSC 2010»
13 years 7 months ago
SigFree: A Signature-Free Buffer Overflow Attack Blocker
—We propose SigFree, an online signature-free out-of-the-box application-layer method for blocking code-injection buffer overflow attack messages targeting at various Internet se...
Xinran Wang, Chi-Chun Pan, Peng Liu, Sencun Zhu
ICDE
2007
IEEE
99views Database» more  ICDE 2007»
14 years 10 months ago
Source-aware Entity Matching: A Compositional Approach
Entity matching (a.k.a. record linkage) plays a crucial role in integrating multiple data sources, and numerous matching solutions have been developed. However, the solutions have...
Warren Shen, Pedro DeRose, Long Vu, AnHai Doan, Ra...
CVPR
2007
IEEE
14 years 11 months ago
OPTIMOL: automatic Online Picture collecTion via Incremental MOdel Learning
A well-built dataset is a necessary starting point for advanced computer vision research. It plays a crucial role in evaluation and provides a continuous challenge to stateof-the-...
Li-Jia Li, Gang Wang, Fei-Fei Li 0002
WWW
2009
ACM
14 years 10 months ago
Crosslanguage blog mining and trend visualisation
People use weblogs to express thoughts, present ideas and share knowledge, therefore weblogs are extraordinarily valuable resources, amongs others, for trend analysis. Trends are ...
Andreas Juffinger, Elisabeth Lex