Sciweavers

1053 search results - page 204 / 211
» Browsing the 3D Web
Sort
View
IV
2007
IEEE
144views Visualization» more  IV 2007»
15 years 3 months ago
Visualizing Evolving Searches with EvoBerry
Studies show that roughly one-third of searches that are performed on the web require the user to initiate subsequent searches. Bates [1] theorized that with every search the user...
Edward Suvanaphen, Jonathan C. Roberts
SP
2007
IEEE
157views Security Privacy» more  SP 2007»
15 years 3 months ago
Network Flow Watermarking Attack on Low-Latency Anonymous Communication Systems
Many proposed low-latency anonymous communication systems have used various flow transformations such as traffic padding, adding cover traffic (or bogus packets), packet droppi...
Xinyuan Wang, Shiping Chen, Sushil Jajodia
WIKIS
2006
ACM
15 years 3 months ago
Semantic Wikipedia
Wikipedia is the world’s largest collaboratively edited source of encyclopaedic knowledge. But in spite of its utility, its contents are barely machine-interpretable. Structural...
Heiko Haller, Markus Krötzsch, Max Völke...
MOBICOM
2005
ACM
15 years 3 months ago
MoB: a mobile bazaar for wide-area wireless services
We introduce MoB, an infrastructure for collaborative wide-area wireless data services. MoB proposes to change the current model of data services in the following fundamental ways...
Rajiv Chakravorty, Sulabh Agarwal, Suman Banerjee,...
ICICS
2005
Springer
15 years 3 months ago
Remotely Keyed Cryptographics Secure Remote Display Access Using (Mostly) Untrusted Hardware
Software that covertly monitors a user’s actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and remov...
Debra L. Cook, Ricardo A. Baratto, Angelos D. Kero...