Sciweavers

727 search results - page 118 / 146
» Making Distortions Comprehensible
Sort
View
CCS
2011
ACM
12 years 10 months ago
Fear the EAR: discovering and mitigating execution after redirect vulnerabilities
The complexity of modern web applications makes it difficult for developers to fully understand the security implications of their code. Attackers exploit the resulting security v...
Adam Doupé, Bryce Boe, Christopher Kruegel,...
KDD
2012
ACM
197views Data Mining» more  KDD 2012»
12 years 12 days ago
On the separability of structural classes of communities
Three major factors govern the intricacies of community extraction in networks: (1) the application domain includes a wide variety of networks of fundamentally different natures,...
Bruno D. Abrahao, Sucheta Soundarajan, John E. Hop...
IMC
2007
ACM
13 years 11 months ago
I tube, you tube, everybody tubes: analyzing the world's largest user generated content video system
User Generated Content (UGC) is re-shaping the way people watch video and TV, with millions of video producers and consumers. In particular, UGC sites are creating new viewing pat...
Meeyoung Cha, Haewoon Kwak, Pablo Rodriguez, Yong-...
KDD
2009
ACM
210views Data Mining» more  KDD 2009»
14 years 10 months ago
Large-scale behavioral targeting
Behavioral targeting (BT) leverages historical user behavior to select the ads most relevant to users to display. The state-of-the-art of BT derives a linear Poisson regression mo...
Ye Chen, Dmitry Pavlov, John F. Canny

Presentation
609views
15 years 8 months ago
Bus transit service planning and operations in a competitive environment
Transit services are currently facing several challenges in the United States and around the world. For many reasons, among which the fluctuations in gas prices and the state of t...
A. M. El-Geneidy, J. Hourdos, J. Horning