Sciweavers

3039 search results - page 541 / 608
» A Network Positioning System for the Internet
Sort
View
SAC
2008
ACM
14 years 9 months ago
The tale of the weather worm
How humans behave when faced with a disaster, natural or man-made, can be exploited automatically by news-aware malicious software. We introduce weather worms, worms that can auto...
Joe Szabo, John Aycock, Randal Acton, Jörg De...
EMNLP
2010
14 years 7 months ago
Function-Based Question Classification for General QA
In contrast with the booming increase of internet data, state-of-art QA (question answering) systems, otherwise, concerned data from specific domains or resources such as search e...
Fan Bu, Xingwei Zhu, Yu Hao, Xiaoyan Zhu
PET
2007
Springer
15 years 4 months ago
Nymble: Anonymous IP-Address Blocking
Abstract. Anonymizing networks such as Tor allow users to access Internet services privately using a series of routers to hide the client’s IP address from the server. Tor’s su...
Peter C. Johnson, Apu Kapadia, Patrick P. Tsang, S...
ICALP
2004
Springer
15 years 3 months ago
Group Spreading: A Protocol for Provably Secure Distributed Name Service
In order to enable communication between a dynamic collection of peers with given ID’s, such as “machine.cs.school.edu”, over the Internet, a distributed name service must b...
Baruch Awerbuch, Christian Scheideler
ACSAC
1998
IEEE
15 years 2 months ago
Detecting Anomalous and Unknown Intrusions Against Programs
The ubiquity of the Internet connection to desktops has been both boon to business as well as cause for concern for the security of digital assets that may be unknowingly exposed....
Anup K. Gosh, James Wanken, Frank Charron