Sciweavers

19 search results - page 4 / 4
» Performing Group-By before Join
Sort
View
DIMVA
2009
13 years 8 months ago
Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks
Drive-by download attacks are among the most common methods for spreading malware today. These attacks typically exploit memory corruption vulnerabilities in web browsers and brows...
Manuel Egele, Peter Wurzinger, Christopher Kruegel...
ICASSP
2009
IEEE
14 years 2 months ago
Visual saliency with side information
We propose novel algorithms for organizing large image and video datasets using both the visual content and the associated sideinformation, such as time, location, authorship, and...
Wei Jiang, Lexing Xie, Shih-Fu Chang
CBMS
2006
IEEE
14 years 1 months ago
MS2DB: An Algorithmic Approach to Determine Disulfide Linkage Patterns
Determining the number and location of disulfide bonds within a protein provide valuable insight into the protein’s three-dimensional structure. Purely computational methods tha...
Timothy Lee, Rahul Singh, Ten-Yang Yen, Bruce Mach...
DPD
2010
153views more  DPD 2010»
13 years 4 months ago
Cardinality estimation and dynamic length adaptation for Bloom filters
Abstract Bloom filters are extensively used in distributed applications, especially in distributed databases and distributed information systems, to reduce network requirements and...
Odysseas Papapetrou, Wolf Siberski, Wolfgang Nejdl