Author of the publication

Identifying suspicious URLs: an application of large-scale online learning.

, , , and . ICML, volume 382 of ACM International Conference Proceeding Series, page 681-688. ACM, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Maximizing data locality in distributed systems., , , , and . J. Comput. Syst. Sci., 72 (8): 1309-1316 (2006)Dirty Jobs: The Role of Freelance Labor in Web Service Abuse., , , , and . USENIX Security Symposium, USENIX Association, (2011)The Heisenbot Uncertainty Problem: Challenges in Separating Bots from Chaff., , , , and . LEET, USENIX Association, (2008)Dissemination in opportunistic mobile ad-hoc networks: The power of the crowd., , , and . INFOCOM, page 1179-1187. IEEE, (2011)Monkey See, Monkey Do: A Tool for TCP Tracing and Replaying., , , , and . USENIX Annual Technical Conference, General Track, page 87-98. USENIX, (2004)On Object Maintenance in Peer-to-Peer Systems., and . IPTPS, (2006)Measuring Online Service Availability Using Twitter., , , , and . WOSN, USENIX Association, (2010)Dual Frame Motion Compensation with Uneven Quality Assignment., , and . Data Compression Conference, page 262-271. IEEE Computer Society, (2004)Managing Contention with Medley., , and . IEEE Trans. Mob. Comput., 14 (3): 579-591 (2015)Access and mobility of wireless PDA users., and . Mobile Computing and Communications Review, 9 (2): 40-55 (2005)