Sciweavers

25 search results - page 3 / 5
» Censor networks: a critique of
Sort
View
ICDCN
2010
Springer
14 years 17 days ago
Poisoning the Kad Network
Abstract. Since the demise of the Overnet network, the Kad network has become not only the most popular but also the only widely used peer-to-peer system based on a distributed has...
Thomas Locher, David Mysicka, Stefan Schmid, Roger...
KDD
2004
ACM
166views Data Mining» more  KDD 2004»
14 years 6 months ago
Predicting prostate cancer recurrence via maximizing the concordance index
In order to effectively use machine learning algorithms, e.g., neural networks, for the analysis of survival data, the correct treatment of censored data is crucial. The concordan...
Lian Yan, David Verbel, Olivier Saidi
CSWWS
2006
13 years 9 months ago
A Trust Model for Sharing Ratings of Information Providers on the Semantic Web
In the context of the Semantic Web, it may be beneficial for a user (consumer) to receive ratings from other users (advisors) regarding the reliability of an information source (pr...
Jie Zhang, Robin Cohen
HICSS
2005
IEEE
127views Biometrics» more  HICSS 2005»
13 years 11 months ago
Elephant: Network Intrusion Detection Systems that Don't Forget
Modern Network Intrusion Detection Systems (NIDSs) maintain state that helps them accurately detect attacks. Because most NIDSs are signature-based, it is critical to update their...
Michael G. Merideth, Priya Narasimhan
SIGCOMM
2010
ACM
13 years 6 months ago
Circumventing censorship with collage
Oppressive regimes and even democratic governments restrict Internet access. Existing anti-censorship systems often require users to connect through proxies, but these systems are...
Sam Burnett, Nick Feamster, Santosh Vempala