Sciweavers

2469 search results - page 479 / 494
» Self-Protection of Web Content
Sort
View
ICC
2009
IEEE
150views Communications» more  ICC 2009»
14 years 2 months ago
Modeling Human Behavior for Defense Against Flash-Crowd Attacks
—Flash-crowd attacks are the most vicious form of distributed denial of service (DDoS). They flood the victim with service requests generated from numerous bots. Attack requests...
Georgios Oikonomou, Jelena Mirkovic
BTW
2009
Springer
145views Database» more  BTW 2009»
14 years 2 months ago
Retrieving Metadata for Your Local Scholarly Papers
: We present a novel approach to retrieve metadata to scholarly papers stored locally as PDF files. A fingerprint is produced from the PDF fulltext to query an online metadata repo...
David Aumüller
CIKM
2009
Springer
14 years 2 months ago
Event detection from flickr data through wavelet-based spatial analysis
Detecting events from web resources has attracted increasing research interests in recent years. Our focus in this paper is to detect events from photos on Flickr, an Internet ima...
Ling Chen, Abhishek Roy
IWANN
2009
Springer
14 years 2 months ago
Identifying Gene Ontology Areas for Automated Enrichment
Biomedical ontologies provide a commonly accepted scheme for the characterization of biological concepts that enable knowledge sharing and integration. Updating and maintaining an ...
Catia Pesquita, Tiago Grego, Francisco M. Couto
MDM
2009
Springer
269views Communications» more  MDM 2009»
14 years 2 months ago
R-U-In? - Exploiting Rich Presence and Converged Communications for Next-Generation Activity-Oriented Social Networking
—With the growing popularity of social networking, traditional Internet Service Providers (ISPs) and Telecom operators have both started exploring new opportunities to boost thei...
Nilanjan Banerjee, Dipanjan Chakraborty, Koustuv D...