Sciweavers

6240 search results - page 1085 / 1248
» From Internet Information Searching to Information Summarizi...
Sort
View
93
Voted
SEC
2008
15 years 3 months ago
HoneyID : Unveiling Hidden Spywares by Generating Bogus Events
A particular type of spyware which uses the user's events covertly, such as keyloggers and password stealers, has become a big threat to Internet users. Due to the prevalence ...
Jeheon Han, Jonghoon Kwon, Heejo Lee
IADIS
2004
15 years 3 months ago
Constructing digital libraries with quality
Digital Libraries can be considered islands of specialized collections on the Web, which have their own management policy to control publishing and access, offering an environment...
Ewerton M. Salvador, José Jorge L. D. Jr., ...
109
Voted
COMAD
2009
15 years 2 months ago
Consistency of Databases on Commodity Disk Drives
Most database systems use ARIES-like logging and recovery scheme to recover from failures and guarantee transactional consistency. ARIES relies on the Write-Ahead Logging (WAL) pr...
Robin Dhamankar, Hanuma Kodavalla, Vishal Kathuria
CORR
2008
Springer
106views Education» more  CORR 2008»
15 years 1 months ago
Distributed Algorithms for Computing Alternate Paths Avoiding Failed Nodes and Links
A recent study characterizing failures in computer networks shows that transient single element (node/link) failures are the dominant failures in large communication networks like...
Amit M. Bhosle, Teofilo F. Gonzalez
98
Voted
COMSUR
2007
101views more  COMSUR 2007»
15 years 1 months ago
A survey of covert channels and countermeasures in computer network protocols
Covert channels are used for the secret transfer of information. Encryption only protects communication from being decoded by unauthorised parties, whereas covert channels aim to ...
Sebastian Zander, Grenville J. Armitage, Philip Br...
« Prev « First page 1085 / 1248 Last » Next »