Sciweavers

12766 search results - page 2512 / 2554
» collective
Sort
View
WWW
2011
ACM
14 years 11 months ago
Prophiler: a fast filter for the large-scale detection of malicious web pages
Malicious web pages that host drive-by-download exploits have become a popular means for compromising hosts on the Internet and, subsequently, for creating large-scale botnets. In...
Davide Canali, Marco Cova, Giovanni Vigna, Christo...
WWW
2011
ACM
14 years 11 months ago
Network bucket testing
Bucket testing, also known as A/B testing, is a practice that is widely used by on-line sites with large audiences: in a simple version of the methodology, one evaluates a new fea...
Lars Backstrom, Jon M. Kleinberg
WWW
2011
ACM
14 years 11 months ago
Filtering microblogging messages for social TV
Social TV was named one of the ten most important emerging technologies in 2010 by the MIT Technology Review. Manufacturers of set-top boxes and televisions have recently started ...
Ovidiu Dan, Junlan Feng, Brian D. Davison
IJDAR
2011
214views more  IJDAR 2011»
14 years 11 months ago
SCUT-COUCH2009 - a comprehensive online unconstrained Chinese handwriting database and benchmark evaluation
: A comprehensive online unconstrained Chinese handwriting dataset, SCUT-COUCH2009, is introduced in this paper. As a revision of SCUT-COUCH2008 [1], the SCUT-COUCH2009 database co...
Lianwen Jin, Yan Gao, Gang Liu, Yunyang Li, Kai Di...
CORR
2010
Springer
236views Education» more  CORR 2010»
14 years 11 months ago
Precise, Scalable and Online Request Tracing for Multi-tier Services of Black Boxes
As more and more multi-tier services are developed from commercial off-the-shelf components or heterogeneous middleware without source code available, both developers and administr...
Bo Sang, Jianfeng Zhan, Zhihong Zhang, Lei Wang, D...
« Prev « First page 2512 / 2554 Last » Next »