Sciweavers

6955 search results - page 1124 / 1391
» Mobile Recommender Systems
Sort
View
CCS
2003
ACM
15 years 9 months ago
Using graphic turing tests to counter automated DDoS attacks against web servers
We present WebSOS, a novel overlay-based architecture that provides guaranteed access to a web server that is targeted by a denial of service (DoS) attack. Our approach exploits t...
William G. Morein, Angelos Stavrou, Debra L. Cook,...
KDD
2009
ACM
379views Data Mining» more  KDD 2009»
15 years 9 months ago
MetaFac: community discovery via relational hypergraph factorization
This paper aims at discovering community structure in rich media social networks, through analysis of time-varying, multi-relational data. Community structure represents the laten...
Yu-Ru Lin, Jimeng Sun, Paul Castro, Ravi B. Konuru...
144
Voted
OSS
2009
Springer
15 years 9 months ago
Reporting Empirical Research in Open Source Software: The State of Practice
Background: The number of reported empirical studies of Open Source Software (OSS) has continuously been increasing. However, there has been no effort to systematically review the ...
Klaas-Jan Stol, Muhammad Ali Babar
CCS
2006
ACM
15 years 8 months ago
Replayer: automatic protocol replay by binary analysis
We address the problem of replaying an application dialog between two hosts. The ability to accurately replay application dialogs is useful in many security-oriented applications,...
James Newsome, David Brumley, Jason Franklin, Dawn...
155
Voted
CAV
2000
Springer
187views Hardware» more  CAV 2000»
15 years 8 months ago
Combining Decision Diagrams and SAT Procedures for Efficient Symbolic Model Checking
In this paper we show how to do symbolic model checking using Boolean Expression Diagrams (BEDs), a non-canonical representation for Boolean formulas, instead of Binary Decision Di...
Poul Frederick Williams, Armin Biere, Edmund M. Cl...
« Prev « First page 1124 / 1391 Last » Next »