Sciweavers

641 search results - page 121 / 129
» Massive-Scale Data Management using Standards-Based Solution...
Sort
View
WWW
2009
ACM
16 years 10 days ago
Releasing search queries and clicks privately
The question of how to publish an anonymized search log was brought to the forefront by a well-intentioned, but privacy-unaware AOL search log release. Since then a series of ad-h...
Aleksandra Korolova, Krishnaram Kenthapadi, Nina M...
IPPS
2006
IEEE
15 years 5 months ago
A simulation study of the effects of multi-path approaches in e-commerce applications
Response time is a key factor of any e-Commerce application, and a set of solutions have been proposed to provide low response time despite network congestions or failures. Being ...
Paolo Romano, Francesco Quaglia, Bruno Ciciani
ASPLOS
2006
ACM
15 years 3 months ago
Comprehensively and efficiently protecting the heap
The goal of this paper is to propose a scheme that provides comprehensive security protection for the heap. Heap vulnerabilities are increasingly being exploited for attacks on co...
Mazen Kharbutli, Xiaowei Jiang, Yan Solihin, Guru ...
110
Voted
CIDR
2009
141views Algorithms» more  CIDR 2009»
15 years 23 days ago
Sailing the Information Ocean with Awareness of Currents: Discovery and Application of Source Dependence
The Web has enabled the availability of a huge amount of useful information, but has also eased the ability to spread false information and rumors across multiple sources, making ...
Laure Berti-Equille, Anish Das Sarma, Xin Dong, Am...
WWW
2007
ACM
16 years 10 days ago
Discovering the best web service
Major research challenges in discovering Web services include, provisioning of services across multiple or heterogeneous registries, differentiating between services that share si...
Eyhab Al-Masri, Qusay H. Mahmoud