Sciweavers

SAC
2015
ACM
8 years 8 months ago
Multi-component similarity method for web product duplicate detection
Due to the growing number of Web shops, aggregating product data from the Web is growing in importance. One of the problems encountered in product aggregation is duplicate detecti...
Ronald van Bezu, Sjoerd Borst, Rick Rijkse, Jim Ve...
SAC
2015
ACM
8 years 8 months ago
Performance prediction for set similarity joins
Query performance prediction is essential for many important tasks in cloud-based database management including resource provisioning, admission control, and pricing. Recently, th...
Christiane Faleiro Sidney, Diego Sarmento Mendes, ...
SAC
2015
ACM
8 years 8 months ago
pFOIL-DL: learning (fuzzy) EL concept descriptions from crisp OWL data using a probabilistic ensemble estimation
OWL ontologies are nowadays a quite popular way to describe structured knowledge in terms of classes, relations among classes and class instances. In this paper, given an OWL targ...
Umberto Straccia, Matteo Mucci
SAC
2015
ACM
8 years 8 months ago
SmartAuth: dynamic context fingerprinting for continuous user authentication
As recent incidents have shown, weak passwords are a severe security risk for authenticating users and granting access to protected resources. Additionally, strong passwords score...
Davy Preuveneers, Wouter Joosen
SAC
2015
ACM
8 years 8 months ago
SecSess: keeping your session tucked away in your browser
Session management is a crucial component in every modern web application. It links subsequent requests and temporary stateful information together, enabling a rich and interactiv...
Philippe De Ryck, Lieven Desmet, Frank Piessens, W...
SAC
2015
ACM
8 years 8 months ago
Predictability in human-agent cooperation: adapting to humans' personalities
Making artificial agents a constituent part of human activities leads to more affiliated teamwork scenarios and at the same time introduces several new challenges. One challenge ...
Sebastian Ahrndt, Benjamin Breitung, Johannes F&au...
SAC
2015
ACM
8 years 8 months ago
Automated software winnowing
The strong isolation guarantees of hardware virtualization have led to its widespread use. A consequence of this is that individual partitions contain much software that is design...
Gregory Malecha, Ashish Gehani, Natarajan Shankar
SAC
2015
ACM
8 years 8 months ago
HTTP over UDP: an experimental investigation of QUIC
This paper investigates “Quick UDP Internet Connections” (QUIC), which was proposed by Google in 2012 as a reliable protocol on top of UDP in order to reduce Web Page retrieva...
Gaetano Carlucci, Luca De Cicco, Saverio Mascolo
SAC
2015
ACM
8 years 8 months ago
A universal topic framework (UniZ) and its application in online search
Probabilistic topic models, such as PLSA and LDA, are gaining popularity in many fields due to their high-quality results. Unfortunately, existing topic models suffer from two d...
Youngchul Cha, Keng-hao Chang, Hari Bommaganti, Ye...
SAC
2015
ACM
8 years 8 months ago
Fast as a shadow, expressive as a tree: hybrid memory monitoring for C
One classical approach to ensuring memory safety of C programs is based on storing block metadata in a tree-like datastructure. However it becomes relatively slow when the number ...
Arvid Jakobsson, Nikolai Kosmatov, Julien Signoles