Sciweavers

756 search results - page 93 / 152
» Leveraging the CAPTCHA Problem
Sort
View
NDSS
2005
IEEE
14 years 2 months ago
Privacy-Preserving Friends Troubleshooting Network
— Content sharing is a popular use of peer-to-peer systems because of their inherent scalability and low cost of maintenance. In this paper, we leverage this nature of peer-topee...
Qiang Huang, Helen J. Wang, Nikita Borisov
SP
2005
IEEE
100views Security Privacy» more  SP 2005»
14 years 2 months ago
Polygraph: Automatically Generating Signatures for Polymorphic Worms
It is widely believed that content-signature-based intrusion detection systems (IDSes) are easily evaded by polymorphic worms, which vary their payload on every infection attempt....
James Newsome, Brad Karp, Dawn Xiaodong Song
STEP
2005
IEEE
14 years 2 months ago
Adoption-Centric Software Maintenance Process Improvement via Information Integration
Software process improvement is an iterative activity, normally involving measurement, analysis, and change. For most organizations, the existing software process has substantial ...
Shihong Huang, Scott R. Tilley, Michael VanHilst, ...
IMC
2005
ACM
14 years 2 months ago
Exploiting Internet Route Sharing for Large Scale Available Bandwidth Estimation
Recent progress in active measurement techniques has made it possible to estimate end-to-end path available bandwidth. However, how to efficiently obtain available bandwidth info...
Ningning Hu, Peter Steenkiste
MM
2005
ACM
175views Multimedia» more  MM 2005»
14 years 2 months ago
Towards context-aware face recognition
In this paper, we focus on the use of context-aware, collaborative filtering, machine-learning techniques that leverage automatically sensed and inferred contextual metadata toget...
Marc Davis, Michael Smith, John F. Canny, Nathan G...