Sciweavers

1145 search results - page 162 / 229
» Open Information Extraction from the Web
Sort
View
ACSAC
2004
IEEE
13 years 12 months ago
Detecting Attacks That Exploit Application-Logic Errors Through Application-Level Auditing
Host security is achieved by securing both the operating system kernel and the privileged applications that run on top of it. Application-level bugs are more frequent than kernel-...
Jingyu Zhou, Giovanni Vigna
MM
2010
ACM
199views Multimedia» more  MM 2010»
13 years 8 months ago
TOP-SURF: a visual words toolkit
TOP-SURF is an image descriptor that combines interest points with visual words, resulting in a high performance yet compact descriptor that is designed with a wide range of conte...
Bart Thomee, Erwin M. Bakker, Michael S. Lew
INFOCOM
2009
IEEE
14 years 2 months ago
Mining the Web and the Internet for Accurate IP Address Geolocations
In this paper, we present Structon, a novel approach that uses Web mining together with inference and IP traceroute to geolocate IP addresses with significantly better accuracy t...
Chuanxiong Guo, Yunxin Liu, Wenchao Shen, Helen J....
HICSS
2002
IEEE
113views Biometrics» more  HICSS 2002»
14 years 1 months ago
Persona: A Contextualized and Personalized Web Search
Abstract— Recent advances in graph-based search techniques derived from Kleinberg’s work [1] have been impressive. This paper further improves the graph-based search algorithm ...
Francisco Tanudjaja, Lik Mu
PDPTA
2010
13 years 6 months ago
Enhancing the Discovery of Web Services: A Keyword-oriented Multiontology Reconciliation
Abstract-- The success of Web Services as a tool to decouple and distribute different processes is beyond any doubt. On the one hand, their distributed nature makes them perfect to...
Carlos Bobed, Eduardo Mena