Sciweavers

29 search results - page 4 / 6
» On the Security of Pay-per-Click and Other Web Advertising S...
Sort
View
GECCO
2007
Springer
308views Optimization» more  GECCO 2007»
14 years 6 days ago
Multiobjective clustering with automatic k-determination for large-scale data
Web mining - data mining for web data - is a key factor of web technologies. Especially, web behavior mining has attracted a great deal of attention recently. Behavior mining invo...
Nobukazu Matake, Tomoyuki Hiroyasu, Mitsunori Miki...
COMCOM
2006
112views more  COMCOM 2006»
13 years 6 months ago
Dynamic server selection using fuzzy inference in content distribution networks
To accommodate the exponential growth of Web traffic, Content Distribution Networks (CDN) have been designed and deployed to distribute content to different cache servers, and to ...
Lin Cai, Jun Ye, Jianping Pan, Xuemin Shen, Jon W....
SOUPS
2005
ACM
13 years 11 months ago
The battle against phishing: Dynamic Security Skins
Phishing is a model problem for illustrating usability concerns of privacy and security because both system designers and attackers battle using user interfaces to guide (or misgu...
Rachna Dhamija, J. Doug Tygar
WMASH
2004
ACM
13 years 11 months ago
Reputation-based Wi-Fi deployment protocols and security analysis
In recent years, wireless Internet service providers (WISPs) have established thousands of WiFi hot spots in cafes, hotels and airports in order to offer to travelling Internet u...
Naouel Ben Salem, Jean-Pierre Hubaux, Markus Jakob...
SWS
2006
ACM
13 years 12 months ago
Single sign-on for java web start applications using myproxy
Single sign-on is critical for the usability of distributed systems. While there are several authentication mechanisms which support single sign-on (e.g. Kerberos and X.509), it m...
Terry Fleury, Jim Basney, Von Welch