Author image not provided
 Lawrence K Saul

Authors:
Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article31.51
Citation Count2,426
Publication count77
Publication years1994-2017
Available for download23
Average downloads per article775.87
Downloads (cumulative)17,845
Downloads (12 Months)1,415
Downloads (6 Weeks)163
SEARCH
ROLE
Arrow RightAuthor only
· Editor only
· Advisor only
· All roles


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


77 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 20 of 77
Result page: 1 2 3 4

Sort by:

1 published by ACM
May 2017 HILDA'17: Proceedings of the 2nd Workshop on Human-In-the-Loop Data Analytics
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 5,   Downloads (12 Months): 46,   Downloads (Overall): 46

Full text available: PDFPDF
Natural language and touch-based interfaces are making data querying significantly easier. But typed SQL remains the gold standard for query sophistication although it is painful in many querying environments. Recent advancements in automatic speech recognition raise the tantalizing possibility of bridging this gap by enabling spoken SQL queries. In this ...

2
May 2016 Concurrency and Computation: Practice & Experience: Volume 28 Issue 7, May 2016
Publisher: John Wiley and Sons Ltd.
Bibliometrics:
Citation Count: 1

Science gateways promote collaboration among researchers by providing them with access to community-developed tools and data collections. The Cyberinfrastructure for Phylogenetic Research CIPRES science gateway is one of the most popular gateways, with approximately 3000 active users since 2012, and the user base is growing each year. While increasing the ...
Keywords: failure analysis, machine learning, science gateways

3 published by ACM
October 2015 IMC '15: Proceedings of the 2015 Internet Measurement Conference
Publisher: ACM
Bibliometrics:
Citation Count: 2
Downloads (6 Weeks): 0,   Downloads (12 Months): 25,   Downloads (Overall): 76

Full text available: PDFPDF
The com, net, and org TLDs contain roughly 150 million registered domains, and domain registrants often have a difficult time finding a desirable and available name. In 2013, ICANN began delegation of a new wave of TLDs into the Domain Name System with the goal of improving meaningful name choice ...
Keywords: domain name system, registration intent, internet economics, top-level domains

4 published by ACM
October 2015 IMC '15: Proceedings of the 2015 Internet Measurement Conference
Publisher: ACM
Bibliometrics:
Citation Count: 7
Downloads (6 Weeks): 1,   Downloads (12 Months): 52,   Downloads (Overall): 105

Full text available: PDFPDF
WHOIS is a long-established protocol for querying information about the 280M+ registered domain names on the Internet. Unfortunately, while such records are accessible in a ``human-readable'' format, they do not follow any consistent schema and thus are challenging to analyze at scale. Existing approaches, which rely on manual crafting of ...
Keywords: information extraction, named entity recognition, whois, machine learning

5 published by ACM
November 2014 IMC '14: Proceedings of the 2014 Conference on Internet Measurement Conference
Publisher: ACM
Bibliometrics:
Citation Count: 8
Downloads (6 Weeks): 9,   Downloads (12 Months): 51,   Downloads (Overall): 209

Full text available: PDFPDF
Black hat search engine optimization (SEO), the practice of abusively manipulating search results, is an enticing method to acquire targeted user traffic. In turn, a range of interventions--from modifying search results to seizing domains--are used to combat this activity. In this paper, we examine the effectiveness of these interventions in ...
Keywords: search engine optimization, cloaking, web spam

6 published by ACM
August 2014 KDD '14: Proceedings of the 20th ACM SIGKDD international conference on Knowledge discovery and data mining
Publisher: ACM
Bibliometrics:
Citation Count: 6
Downloads (6 Weeks): 5,   Downloads (12 Months): 41,   Downloads (Overall): 308

Full text available: PDFPDF
We describe an automated system for the large-scale monitoring of Web sites that serve as online storefronts for spam-advertised goods. Our system is developed from an extensive crawl of black-market Web sites that deal in illegal pharmaceuticals, replica luxury goods, and counterfeit software. The operational goal of the system is ...
Keywords: email spam, web page classification

7
June 2013 ICML'13: Proceedings of the 30th International Conference on International Conference on Machine Learning - Volume 28
Publisher: JMLR.org
Bibliometrics:
Citation Count: 0

We study the problem of topic modeling in corpora whose documents are organized in a multi-level hierarchy. We explore a parametric approach to this problem, assuming that the number of topics is known or can be estimated by cross-validation. The models we consider can be viewed as special (finite-dimensional) instances ...

8
April 2013 nsdi'13: Proceedings of the 10th USENIX conference on Networked Systems Design and Implementation
Publisher: USENIX Association
Bibliometrics:
Citation Count: 29

The past few years have witnessed an evolutionary change in the smartphone ecosystem. Smartphones have gone from closed platforms containing only preinstalled applications to open platforms hosting a variety of thirdparty applications. Unfortunately, this change has also led to a rapid increase in Abnormal Battery Drain (ABD) problems that can ...

9
December 2012 NIPS'12: Proceedings of the 25th International Conference on Neural Information Processing Systems - Volume 2
Publisher: Curran Associates Inc.
Bibliometrics:
Citation Count: 0

We describe a latent variable model for supervised dimensionality reduction and distance metric learning. The model discovers linear projections of high dimensional data that shrink the distance between similarly labeled inputs and expand the distance between differently labeled ones. The model's continuous latent variables locate pairs of examples in a ...

10
December 2011 NIPS'11: Proceedings of the 24th International Conference on Neural Information Processing Systems
Publisher: Curran Associates Inc.
Bibliometrics:
Citation Count: 8

We propose maximum covariance unfolding (MCU), a manifold learning algorithm for simultaneous dimensionality reduction of data from different input modalities. Given high dimensional inputs from two different but naturally aligned sources, MCU computes a common low dimensional embedding that maximizes the cross-modal (inter-source) correlations while preserving the local (intra-source) distances. ...

11 published by ACM
October 2011 AISec '11: Proceedings of the 4th ACM workshop on Security and artificial intelligence
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 2,   Downloads (12 Months): 29,   Downloads (Overall): 230

Full text available: PDFPDF
Web services such as Google, Facebook, and Twitter are recurring victims of abuse, and their plight will only worsen as more attackers are drawn to their large user bases. Many attackers hire cheap, human labor to actualize their schemes, connecting with potential workers via crowdsourcing and freelancing sites such as ...
Keywords: crowdsourcing, latent dirichlet allocation

12 published by ACM
October 2011 AISec '11: Proceedings of the 4th ACM workshop on Security and artificial intelligence
Publisher: ACM
Bibliometrics:
Citation Count: 5
Downloads (6 Weeks): 6,   Downloads (12 Months): 32,   Downloads (Overall): 280

Full text available: PDFPDF
The physical world is rife with cues that allow us to distinguish between safe and unsafe situations. By contrast, the Internet offers a much more ambiguous environment; hence many users are unable to distinguish a scam from a legitimate Web page. To help address this problem, we explore how to ...
Keywords: blacklisting, web security, machine learning

13 published by ACM
May 2011 ACM Transactions on Intelligent Systems and Technology (TIST): Volume 2 Issue 3, April 2011
Publisher: ACM
Bibliometrics:
Citation Count: 15
Downloads (6 Weeks): 14,   Downloads (12 Months): 156,   Downloads (Overall): 1,196

Full text available: PDFPDF
Malicious Web sites are a cornerstone of Internet criminal activities. The dangers of these sites have created a demand for safeguards that protect end-users from visiting them. This article explores how to detect malicious Web sites from the lexical and host-based features of their URLs. We show that this problem ...
Keywords: Online learning, malicious Web sites

14
December 2010 NIPS'10: Proceedings of the 23rd International Conference on Neural Information Processing Systems - Volume 1
Publisher: Curran Associates Inc.
Bibliometrics:
Citation Count: 0

When software developers modify one or more files in a large code base, they must also identify and update other related files. Many file dependencies can be detected by mining the development history of the code base: in essence, groups of related files are revealed by the logs of previous ...

15
October 2010 Neural Computation: Volume 22 Issue 10, October 2010
Publisher: MIT Press
Bibliometrics:
Citation Count: 9

We introduce a new family of positive-definite kernels for large margin classification in support vector machines (SVMs). These kernels mimic the computation in large neural networks with one layer of hidden units. We also show how to derive new kernels, by recursive composition, that may be viewed as mapping their ...

16 published by ACM
July 2010 KDD '10: Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining
Publisher: ACM
Bibliometrics:
Citation Count: 17
Downloads (6 Weeks): 9,   Downloads (12 Months): 120,   Downloads (Overall): 946

Full text available: PDFPDF
The security demands on modern system administration are enormous and getting worse. Chief among these demands, administrators must monitor the continual ongoing disclosure of software vulnerabilities that have the potential to compromise their systems in some way. Such vulnerabilities include buffer overflow errors, improperly validated inputs, and other unanticipated attack ...
Keywords: SVM, vulnerabilities, exploits, supervised learning

17
December 2009 NIPS'09: Proceedings of the 22nd International Conference on Neural Information Processing Systems
Publisher: Curran Associates Inc.
Bibliometrics:
Citation Count: 19

We introduce a new family of positive-definite kernel functions that mimic the computation in large, multilayer neural nets. These kernel functions can be used in shallow architectures, such as support vector machines (SVMs), or in deep kernel-based architectures that we call multilayer kernel machines (MKMs). We evaluate SVMs and MKMs ...

18 published by ACM
July 2009 Communications of the ACM - Barbara Liskov: ACM's A.M. Turing Award Winner: Volume 52 Issue 7, July 2009
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 0,   Downloads (12 Months): 17,   Downloads (Overall): 431

Full text available: HtmlHtml  PDFPDF

19 published by ACM
June 2009 KDD '09: Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining
Publisher: ACM
Bibliometrics:
Citation Count: 90
Downloads (6 Weeks): 32,   Downloads (12 Months): 236,   Downloads (Overall): 2,014

Full text available: PDFPDF
Malicious Web sites are a cornerstone of Internet criminal activities. As a result, there has been broad interest in developing systems to prevent the end user from visiting such sites. In this paper, we describe an approach to this problem based on automated URL classification, using statistical methods to discover ...
Keywords: supervised learning, L1-regularization, malicious web sites

20 published by ACM
June 2009 ICML '09: Proceedings of the 26th Annual International Conference on Machine Learning
Publisher: ACM
Bibliometrics:
Citation Count: 2
Downloads (6 Weeks): 0,   Downloads (12 Months): 8,   Downloads (Overall): 130

Full text available: PDFPDF
In this paper, we investigate a simple, mistake-driven learning algorithm for discriminative training of continuous density hidden Markov models (CD-HMMs). Most CD-HMMs for automatic speech recognition use multivariate Gaussian emission densities (or mixtures thereof) parameterized in terms of their means and covariance matrices. For discriminative training of CD-HMMs, we reparameterize ...



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us