Sciweavers

1122 search results - page 96 / 225
» Information Retrieval in Network Administration
Sort
View
CIKM
2008
Springer
15 years 12 days ago
Cost-effective spam detection in p2p file-sharing systems
Spam is highly pervasive in P2P file-sharing systems and is difficult to detect automatically before actually downloading a file due to the insufficient and biased description of ...
Dongmei Jia
ICDCSW
2003
IEEE
15 years 4 months ago
Entry Points into a Smart Campus Environment - Overview of the ETHOC System
The university campus is an interesting application environment for the ubiquitous computing paradigm: a large number of users share a substantial amount of their information need...
Michael Rohs, Jürgen Bohn
SACMAT
2010
ACM
15 years 4 months ago
An access control model for mobile physical objects
Access to distributed databases containing tuples collected about mobile physical objects requires information about the objects’ trajectories. Existing access control models ca...
Florian Kerschbaum
ACSAC
1998
IEEE
15 years 3 months ago
Concentric Supervision of Security Applications: A New Security Management Paradigm
This paper questions the status quo regarding Security Management (SM) tools that function in an isolated, monolithic fashion. People work best by interacting with others and with...
P. C. Hyland, Ravi S. Sandhu
WWW
2006
ACM
15 years 12 months ago
The SOWES approach to P2P web search using semantic overlays
Peer-to-peer (P2P) Web search has gained a lot of interest lately, due to the salient characteristics of P2P systems, namely scalability, fault-tolerance and load-balancing. Howev...
Christos Doulkeridis, Kjetil Nørvåg, ...