Sciweavers

17390 search results - page 3402 / 3478
» Distributed Data Clustering
Sort
View
PET
2005
Springer
15 years 5 months ago
Privacy Vulnerabilities in Encrypted HTTP Streams
Abstract. Encrypting traffic does not prevent an attacker from performing some types of traffic analysis. We present a straightforward traffic analysis attack against encrypted HT...
George Dean Bissias, Marc Liberatore, David Jensen...
RSFDGRC
2005
Springer
111views Data Mining» more  RSFDGRC 2005»
15 years 5 months ago
Knowledge Discovery Based Query Answering in Hierarchical Information Systems
The paper concerns failing queries in incomplete Distributed Autonomous Information Systems (DAIS) based on attributes which are hierarchical and which semantics at different site...
Zbigniew W. Ras, Agnieszka Dardzinska, Osman G&uum...
VLDB
2005
ACM
162views Database» more  VLDB 2005»
15 years 5 months ago
FiST: Scalable XML Document Filtering by Sequencing Twig Patterns
In recent years, publish-subscribe (pub-sub) systems based on XML document filtering have received much attention. In a typical pubsub system, subscribed users specify their inte...
Joonho Kwon, Praveen Rao, Bongki Moon, Sukho Lee
VLDB
2005
ACM
90views Database» more  VLDB 2005»
15 years 5 months ago
Tuning Schema Matching Software using Synthetic Scenarios
Most recent schema matching systems assemble multiple components, each employing a particular matching technique. The domain user must then tune the system: select the right compo...
Mayssam Sayyadian, Yoonkyong Lee, AnHai Doan, Arno...
ATAL
2005
Springer
15 years 5 months ago
Optimal status sets of heterogeneous agent programs
There are many situations where an agent can perform one of several sets of actions in responses to changes in its environment, and the agent chooses to perform the set of actions...
Bogdan Stroe, V. S. Subrahmanian, Sudeshna Dasgupt...
« Prev « First page 3402 / 3478 Last » Next »