Sciweavers

11547 search results - page 2210 / 2310
» Quantum computing and communication
Sort
View
WSDM
2010
ACM
315views Data Mining» more  WSDM 2010»
16 years 1 months ago
SBotMiner: Large Scale Search Bot Detection
In this paper, we study search bot traffic from search engine query logs at a large scale. Although bots that generate search traffic aggressively can be easily detected, a large ...
Fang Yu, Yinglian Xie, Qifa Ke
EUROSYS
2009
ACM
16 years 1 months ago
Privacy-preserving browser-side scripting with BFlow
Some web sites provide interactive extensions using browser scripts, often without inspecting the scripts to verify that they are benign and bug-free. Others handle users’ conï¬...
Alexander Yip, Neha Narula, Maxwell N. Krohn, Robe...
EUROSYS
2008
ACM
16 years 1 months ago
Eudaemon: involuntary and on-demand emulation against zero-day exploits
Eudaemon is a technique that aims to blur the borders between protected and unprotected applications, and brings together honeypot technology and end-user intrusion detection and ...
Georgios Portokalidis, Herbert Bos
EUROSYS
2006
ACM
16 years 1 months ago
The SMART way to migrate replicated stateful services
Many stateful services use the replicated state machine approach for high availability. In this approach, a service runs on multiple machines to survive machine failures. This pap...
Jacob R. Lorch, Atul Adya, William J. Bolosky, Ron...
ALT
2003
Springer
16 years 1 months ago
Learning a Subclass of Regular Patterns in Polynomial Time
An algorithm for learning a subclass of erasing regular pattern languages is presented. On extended regular pattern languages generated by patterns π of the form x0α1x1 . . . α...
John Case, Sanjay Jain, Rüdiger Reischuk, Fra...
« Prev « First page 2210 / 2310 Last » Next »