Sciweavers

1388 search results - page 177 / 278
» Approximability of Robust Network Design
Sort
View
93
Voted
WWW
2004
ACM
16 years 1 months ago
Spam attacks: p2p to the rescue
We propose a decentralized privacy-preserving approach to spam filtering. Our solution exploits robust digests to identify messages that are a slight variation of one another and ...
Ernesto Damiani, Sabrina De Capitani di Vimercati,...
DCC
2010
IEEE
15 years 7 months ago
A Flexible Multiple Description Coding Scheme Based on Rateless Codes
The multiple description coding of an independent and identically distributed Gaussian source over bit error channels is considered. A novel practical multiple description coding ...
Ozgun Y. Bursalioglu, Giuseppe Caire
80
Voted
DSN
2005
IEEE
15 years 6 months ago
Model-Based Failure Analysis of Journaling File Systems
We propose a novel method to measure the dependability of journaling file systems. In our approach, we build models of how journaling file systems must behave under different jo...
Vijayan Prabhakaran, Andrea C. Arpaci-Dusseau, Rem...
IPCCC
2005
IEEE
15 years 6 months ago
A key distribution scheme for double authentication in link state routing protocol
The Double Authentication (DA) scheme presented in [1] is designed to provide security against impersonation attack to link state routing protocol at a lower computational cost as...
D. Huang, A. Sinha, D. Medhi
90
Voted
ECAI
2004
Springer
15 years 6 months ago
An architecture based on semantic weblogs for exploring the Web of People
This paper presents an architecture that helps users to collect and qualify meta-information about web resources within a weblog and then share them with a group of people. Our arc...
Tuan-Anh Ta, Jean-Marc Saglio, Michel Plu