Sciweavers

79 search results - page 14 / 16
» Link Spam Alliances
Sort
View
VLDB
2005
ACM
177views Database» more  VLDB 2005»
15 years 2 months ago
Discovering Large Dense Subgraphs in Massive Graphs
We present a new algorithm for finding large, dense subgraphs in massive graphs. Our algorithm is based on a recursive application of fingerprinting via shingles, and is extreme...
David Gibson, Ravi Kumar, Andrew Tomkins
NSDI
2008
14 years 11 months ago
Ostra: Leveraging Trust to Thwart Unwanted Communication
Online communication media such as email, instant messaging, bulletin boards, voice-over-IP, and social networking sites allow any sender to reach potentially millions of users at...
Alan Mislove, Ansley Post, Peter Druschel, P. Kris...
WISEC
2010
ACM
15 years 4 months ago
Timing-based localization of in-band wormhole tunnels in MANETs
The problem of localizing in-band wormhole tunnels in MANETs is considered. In an in-band wormhole attack, colluding attackers use a covert tunnel to create the illusion that two ...
Jinsub Kim, Dan Sterne, Rommie Hardy, Roshan K. Th...
ECIS
2004
14 years 10 months ago
Organizational Performance of a Firm in a Modular Business Network
The organizational capabilities to interact with others have been greatly improved as a result of modern information and communications technologies: Nowadays a company can mainta...
Diederik W. van Liere, Lorike Hagdorn van der Meij...
WWW
2006
ACM
15 years 10 months ago
Detecting semantic cloaking on the web
By supplying different versions of a web page to search engines and to browsers, a content provider attempts to cloak the real content from the view of the search engine. Semantic...
Baoning Wu, Brian D. Davison