Sciweavers

4201 search results - page 155 / 841
» Our Users have Root!
Sort
View
AAAI
2004
13 years 9 months ago
Interpreting Loosely Encoded Questions
Knowledge-based question-answering systems have become quite competent and robust at answering a wide range of questions in different domains, however in order to ask questions co...
James Fan, Bruce W. Porter
CIB
2005
101views more  CIB 2005»
13 years 8 months ago
Association-Based Segmentation for Chinese-Crossed Query Expansion
The continually and high-rate growth of China's economy has attracted more and more international investors. These investors have an urgent need of identifying patterns in Chi...
Chengqi Zhang, Zhenxing Qin, Xiaowei Yan
PAAPP
2007
112views more  PAAPP 2007»
13 years 7 months ago
A study on video viewing behavior: application to movie trailer miner
In this paper, we present a study on video viewing behavior. Based on a well-suited Markovian model, we have developed a clustering algorithm called K-Models and inspired by the K...
Sylvain Mongy
P2P
2010
IEEE
115views Communications» more  P2P 2010»
13 years 6 months ago
IMP: ISP-Managed P2P
—Internet Service Providers (ISPs) have failed to reduce the cost of peer-to-peer (P2P) traffic. Traffic throttling devices increase user download times, and caches store content...
Shakir James, Patrick Crowley
EDO
2005
Springer
14 years 1 months ago
Using parse tree validation to prevent SQL injection attacks
An SQL injection attack targets interactive web applications that employ database services. Such applications accept user input, such as form fields, and then include this input ...
Gregory Buehrer, Bruce W. Weide, Paolo A. G. Sivil...