Sciweavers

276 search results - page 55 / 56
» An Effective Complete-Web Recommender System
Sort
View
VLDB
2005
ACM
105views Database» more  VLDB 2005»
13 years 10 months ago
Light-weight Domain-based Form Assistant: Querying Web Databases On the Fly
The Web has been rapidly “deepened” by myriad searchable databases online, where data are hidden behind query forms. Helping users query alternative “deep Web” sources in ...
Zhen Zhang, Bin He, Kevin Chen-Chuan Chang
MOBICOM
2003
ACM
13 years 10 months ago
Manycast: exploring the space between anycast and multicast in ad hoc networks
The characteristics of ad hoc networks naturally encourage the deployment of distributed services. Although current networks implement group communication methods, they do not sup...
Casey Carter, Seung Yi, Prashant Ratanchandani, Ro...
WORM
2004
13 years 6 months ago
Toward understanding distributed blackhole placement
The monitoring of unused Internet address space has been shown to be an effective method for characterizing Internet threats including Internet worms and DDOS attacks. Because the...
Evan Cooke, Michael Bailey, Zhuoqing Morley Mao, D...
CORR
2006
Springer
180views Education» more  CORR 2006»
13 years 5 months ago
Social Networks and Social Information Filtering on Digg
The new social media sites--blogs, wikis, Flickr and Digg, among others--underscore the transformation of the Web to a participatory medium in which users are actively creating, e...
Kristina Lerman
JSAC
2006
181views more  JSAC 2006»
13 years 5 months ago
Information theoretic framework of trust modeling and evaluation for ad hoc networks
Abstract-- The performance of ad hoc networks depends on cooperation and trust among distributed nodes. To enhance security in ad hoc networks, it is important to evaluate trustwor...
Yan Lindsay Sun, Wei Yu, Zhu Han, K. J. Ray Liu