Sciweavers

28821 search results - page 5652 / 5765
» Distributed and parallel systems
Sort
View
127
Voted
CCS
2009
ACM
15 years 10 months ago
Scalable onion routing with torsk
We introduce Torsk, a structured peer-to-peer low-latency anonymity protocol. Torsk is designed as an interoperable replacement for the relay selection and directory service of th...
Jon McLachlan, Andrew Tran, Nicholas Hopper, Yongd...
CTRSA
2009
Springer
151views Cryptology» more  CTRSA 2009»
15 years 10 months ago
Key-Private Proxy Re-encryption
Proxy re-encryption (PRE) allows a proxy to convert a ciphertext encrypted under one key into an encryption of the same message under another key. The main idea is to place as lit...
Giuseppe Ateniese, Karyn Benson, Susan Hohenberger
129
Voted
KDD
2009
ACM
210views Data Mining» more  KDD 2009»
15 years 10 months ago
Modeling and predicting user behavior in sponsored search
Implicit user feedback, including click-through and subsequent browsing behavior, is crucial for evaluating and improving the quality of results returned by search engines. Severa...
Josh Attenberg, Sandeep Pandey, Torsten Suel
TACAS
2009
Springer
101views Algorithms» more  TACAS 2009»
15 years 10 months ago
Parametric Trace Slicing and Monitoring
Analysis of execution traces plays a fundamental role in many program analysis approaches. Execution traces are frequently parametric, i.e., they contain events with parameter bind...
Feng Chen, Grigore Rosu
P2P
2009
IEEE
115views Communications» more  P2P 2009»
15 years 10 months ago
Modeling and Analysis of Bandwidth-Inhomogeneous Swarms in BitTorrent
—A number of analytical models exists that capture various properties of the BitTorrent protocol. However, until now virtually all of these models have been based on the assumpti...
Michel Meulpolder, Johan A. Pouwelse, Dick H. J. E...
« Prev « First page 5652 / 5765 Last » Next »