Sciweavers

4262 search results - page 740 / 853
» Internet and Intranet Computing
Sort
View
139
Voted
NETWORK
2008
94views more  NETWORK 2008»
15 years 4 months ago
Detecting compromised routers via packet forwarding behavior
While it is widely understood that criminal miscreants are subverting large numbers of Internet-connected computers (e.g., for bots, spyware, SPAM forwarding), it is less well app...
Alper Tugay Mizrak, Stefan Savage, Keith Marzullo
IM
2007
15 years 3 months ago
Ranking Websites: A Probabilistic View
In this paper we suggest evaluating the importance of a website with the mean frequency of visiting the website for the Markov chain on the Internet Graph describing random surfi...
Ying Bao, Guang Feng, Tie-Yan Liu, Zhiming Ma, Yin...
ISJGP
2007
146views more  ISJGP 2007»
15 years 3 months ago
End-to-End Security Across Wired-Wireless Networks for Mobile Users
Abstract  Recent advances in mobile computing and wireless communication technologies are enabling high mobility and flexibility of anytime, anywhere service access for mobile us...
Sherali Zeadally, Nicolas Sklavos, Moganakrishnan ...
IWC
2007
92views more  IWC 2007»
15 years 3 months ago
Consumers, channels and communication: Online and offline communication in service consumption
This paper reports on a study that investigated consumer use of e-services in a multichannel context. To develop a deeper understanding of what makes consumers decide to use the o...
Geke van Dijk, Shailey Minocha, Angus Laing
JETAI
2007
141views more  JETAI 2007»
15 years 3 months ago
Exchange market for complex commodities: search for optimal matches
The Internet has led to the development of on-line markets, and computer scientists have designed various auction algorithms, as well as automated exchanges for standardized commo...
Eugene Fink, Jianli Gong, Josh Johnson