Sciweavers

988 search results - page 37 / 198
» Positive Results and Techniques for Obfuscation
Sort
View
URBAN
2008
99views more  URBAN 2008»
13 years 8 months ago
A comparison of address point, parcel and street geocoding techniques
The widespread availability of powerful geocoding tools in commercial GIS software and the interest in spatial analysis at the individual level have made address geocoding a widel...
Paul A. Zandbergen
WWW
2010
ACM
14 years 3 months ago
Detection and analysis of drive-by-download attacks and malicious JavaScript code
JavaScript is a browser scripting language that allows developers to create sophisticated client-side interfaces for web applications. However, JavaScript code is also used to car...
Marco Cova, Christopher Krügel, Giovanni Vign...
CCS
2010
ACM
13 years 9 months ago
@spam: the underground on 140 characters or less
In this work we present a characterization of spam on Twitter. We find that 8% of 25 million URLs posted to the site point to phishing, malware, and scams listed on popular blackl...
Chris Grier, Kurt Thomas, Vern Paxson, Michael Zha...
SIGMETRICS
2012
ACM
290views Hardware» more  SIGMETRICS 2012»
11 years 11 months ago
Power and energy containers for multicore servers
Energy efficiency and power capping remain growing concerns in server systems. Online applications continue to evolve with new features and dynamic clientdirected processing, res...
Kai Shen, Arrvindh Shriraman, Sandhya Dwarkadas, X...
ICMCS
2006
IEEE
152views Multimedia» more  ICMCS 2006»
14 years 2 months ago
Coding Artifact Reduction using Non-Reference Block Grid Visibility Measure
In this work a new method is proposed for coding artifact reduction of MPEG compressed video sequences. The method makes use of a simple cost-effective technique that allows the b...
Ihor O. Kirenko, Remco Muijs, Ling Shao