Sciweavers

2084 search results - page 66 / 417
» Knowledge Exploitation from the Web
Sort
View
IMC
2005
ACM
14 years 3 months ago
Flooding Attacks by Exploiting Persistent Forwarding Loops
In this paper, we present flooding attacks that exploit routing anomalies in the Internet. In particular, we focus on routing anomalies introduced by persistent forwarding loops....
Jianhong Xia, Lixin Gao, Teng Fei
KDD
2010
ACM
272views Data Mining» more  KDD 2010»
14 years 2 months ago
Beyond heuristics: learning to classify vulnerabilities and predict exploits
The security demands on modern system administration are enormous and getting worse. Chief among these demands, administrators must monitor the continual ongoing disclosure of sof...
Mehran Bozorgi, Lawrence K. Saul, Stefan Savage, G...
DIS
2004
Springer
14 years 3 months ago
Product Recommendation in e-Commerce Using Direct and Indirect Confidence for Historical User Sessions
Product recommendation is an important part of current electronic commerce. Useful, direct and indirect relationships between pages, especially product home pages in an e-commerce ...
Przemyslaw Kazienko
CIKM
2008
Springer
14 years 10 days ago
Semi-supervised text categorization by active search
In automated text categorization, given a small number of labeled documents, it is very challenging, if not impossible, to build a reliable classifier that is able to achieve high...
Zenglin Xu, Rong Jin, Kaizhu Huang, Michael R. Lyu...
CC
2009
Springer
106views System Software» more  CC 2009»
14 years 5 months ago
Blind Optimization for Exploiting Hardware Features
Software systems typically exploit only a small fraction of the realizable performance from the underlying microprocessors. While there has been much work on hardware-aware optimiz...
Dan Knights, Todd Mytkowicz, Peter F. Sweeney, Mic...