Sciweavers

5799 search results - page 1100 / 1160
» Position Paper
Sort
View
CCS
2007
ACM
15 years 6 months ago
Analyzing network traffic to detect self-decrypting exploit code
Remotely-launched software exploits are a common way for attackers to intrude into vulnerable computer systems. As detection techniques improve, remote exploitation techniques are...
Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Pu...
CHI
2007
ACM
15 years 6 months ago
Augmenting the mouse with pressure sensitive input
In this paper we investigate the use of a uni-pressure and dual-pressure augmented mouse. With a pressure augmented mouse users can simultaneously control cursor positions as well...
Jared Cechanowicz, Pourang Irani, Sriram Subramani...
129
Voted
COMSWARE
2007
IEEE
15 years 6 months ago
QoS-driven middleware for optimum provisioning of location based services
This paper proposes a middleware to reduce the and consistency are usually poor since they depend on cell consumption of network resources and optimize the provision of size; GPS t...
Israel Martín-Escalona, Francisco Barcel&oa...
115
Voted
CIKM
2009
Springer
15 years 6 months ago
Improving binary classification on text problems using differential word features
We describe an efficient technique to weigh word-based features in binary classification tasks and show that it significantly improves classification accuracy on a range of proble...
Justin Martineau, Tim Finin, Anupam Joshi, Shamit ...
140
Voted
CSE
2009
IEEE
15 years 6 months ago
Churn Prediction in MMORPGs: A Social Influence Based Approach
Massively Multiplayer Online Role Playing Games (MMORPGs) are computer based games in which players interact with one another in the virtual world. Worldwide revenues for MMORPGs h...
Jaya Kawale, Aditya Pal, Jaideep Srivastava
« Prev « First page 1100 / 1160 Last » Next »