Sciweavers

24529 search results - page 4673 / 4906
» Computing on Authenticated Data
Sort
View
ICDCS
2010
IEEE
15 years 7 months ago
Empirical Study of a National-Scale Distributed Intrusion Detection System: Backbone-Level Filtering of HTML Responses in China
Abstract—We present results from measurements of the filtering of HTTP HTML responses in China, which is based on string matching and TCP reset injection by backbone-level route...
Jong Chun Park, Jedidiah R. Crandall
SIGIR
2010
ACM
15 years 7 months ago
Estimation of statistical translation models based on mutual information for ad hoc information retrieval
As a principled approach to capturing semantic relations of words in information retrieval, statistical translation models have been shown to outperform simple document language m...
Maryam Karimzadehgan, ChengXiang Zhai
SP
2010
IEEE
217views Security Privacy» more  SP 2010»
15 years 7 months ago
Experimental Security Analysis of a Modern Automobile
Abstract—Modern automobiles are no longer mere mechanical devices; they are pervasively monitored and controlled by dozens of digital computers coordinated via internal vehicular...
Karl Koscher, Alexei Czeskis, Franziska Roesner, S...
WCNC
2010
IEEE
15 years 7 months ago
Radio Resource Management in OFDMA-Based Cellular Networks Enhanced with Fixed and Nomadic Relays
—The provision of very high data rates in a ubiquitous manner throughout the service area is a great challenge for 4G and beyond-4G wireless networks. Towards that end, the deplo...
Mohamed Salem, Abdulkareem Adinoyi, Halim Yanikome...
132
Voted
GRID
2007
Springer
15 years 7 months ago
Optimizing multiple queries on scientific datasets with partial replicas
We propose strategies to efficiently execute a query workload, which consists of multiple related queries submitted against a scientific dataset, on a distributed-memory system in...
Li Weng, Ümit V. Çatalyürek, Tahs...
« Prev « First page 4673 / 4906 Last » Next »