Sciweavers

6240 search results - page 1095 / 1248
» From Internet Information Searching to Information Summarizi...
Sort
View
97
Voted
SIGCOMM
2010
ACM
15 years 2 months ago
Privacy-preserving P2P data sharing with OneSwarm
Privacy--the protection of information from unauthorized disclosure--is increasingly scarce on the Internet, and yet increasingly important as every user becomes both a content co...
Tomas Isdal, Michael Piatek, Arvind Krishnamurthy,...
ICDE
2010
IEEE
154views Database» more  ICDE 2010»
15 years 2 months ago
Processing online news streams for large-scale semantic analysis
— While Internet has enabled us to access a vast amount of online news articles originating from thousands of different sources, the human capability to read all these articles h...
Milos Krstajic, Florian Mansmann, Andreas Stoffel,...
95
Voted
COMPSEC
2006
110views more  COMPSEC 2006»
15 years 1 months ago
Uncovering identities: A study into VPN tunnel fingerprinting
Operating System fingerprinting is a reconnaissance method which can be used by attackers or forensic investigators. It identifies a system's identity by observing its respon...
Vafa D. Izadinia, Derrick G. Kourie, Jan H. P. Elo...
DSS
2006
74views more  DSS 2006»
15 years 1 months ago
Second opinions and online consultations
Consumers increasingly obtain direct consultations from experts, thanks to the prevalent use of Information Technology and the Internet. Motivated by the online consultation pract...
Zafer D. Ozdemir, M. Tolga Akçura, Kemal Al...
ETT
2006
93views Education» more  ETT 2006»
15 years 1 months ago
A modular access gateway for managing intermittent connectivity in vehicular communications
The Drive-thru Internet architecture allows exploiting intermittent connectivity by temporarily connecting to IEEE 802.11 WLAN access points at the roadside from moving vehicles. T...
Jörg Ott, Dirk Kutscher
« Prev « First page 1095 / 1248 Last » Next »