Sciweavers

1630 search results - page 306 / 326
» Semantic relatedness in semantic networks
Sort
View
MMM
2009
Springer
169views Multimedia» more  MMM 2009»
14 years 5 months ago
Personalized Image Recommendation
—In this paper, we have developed a novel framework called JustClick to enable personalized image recommendation via exploratory search from large-scale collections of manuallyan...
Yuli Gao, Hangzai Luo, Jianping Fan
NDSS
2008
IEEE
14 years 2 months ago
Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution
Protocol reverse engineering has often been a manual process that is considered time-consuming, tedious and error-prone. To address this limitation, a number of solutions have rec...
Zhiqiang Lin, Xuxian Jiang, Dongyan Xu, Xiangyu Zh...
EUROPAR
2009
Springer
14 years 1 months ago
MyriXen: Message Passing in Xen Virtual Machines over Myrinet and Ethernet
Data access in HPC infrastructures is realized via user-level networking and OS-bypass techniques through which nodes can communicate with high bandwidth and low-latency. Virtualiz...
Anastassios Nanos, Nectarios Koziris
CCS
2006
ACM
14 years 6 days ago
An effective defense against email spam laundering
Laundering email spam through open-proxies or compromised PCs is a widely-used trick to conceal real spam sources and reduce spamming cost in underground email spam industry. Spam...
Mengjun Xie, Heng Yin, Haining Wang
USS
2004
13 years 9 months ago
Autograph: Toward Automated, Distributed Worm Signature Detection
Today's Internet intrusion detection systems (IDSes) monitor edge networks' DMZs to identify and/or filter malicious flows. While an IDS helps protect the hosts on its l...
Hyang-Ah Kim, Brad Karp