Sciweavers

17 search results - page 4 / 4
» Theoretical analysis of rank-based mutation - combining expl...
Sort
View
SP
2010
IEEE
165views Security Privacy» more  SP 2010»
13 years 9 months ago
A Practical Attack to De-anonymize Social Network Users
—Social networking sites such as Facebook, LinkedIn, and Xing have been reporting exponential growth rates. These sites have millions of registered users, and they are interestin...
Gilbert Wondracek, Thorsten Holz, Engin Kirda, Chr...
COMCOM
2007
82views more  COMCOM 2007»
13 years 5 months ago
On application-level load balancing in FastReplica
— In the paper, we consider the problem of distributing large-size content to a fixed set of nodes. In contrast with the most existing end-system solutions to this problem, Fast...
Jangwon Lee, Gustavo de Veciana