Sciweavers

5723 search results - page 924 / 1145
» Network Management
Sort
View
WWW
2008
ACM
16 years 5 months ago
Sessionlock: securing web sessions against eavesdropping
Typical web sessions can be hijacked easily by a network eavesdropper in attacks that have come to be designated "sidejacking." The rise of ubiquitous wireless networks,...
Ben Adida
WWW
2008
ACM
16 years 5 months ago
Information retrieval and knowledge discovery on the semantic web of traditional chinese medicine
We conduct the first systematical adoption of the Semantic Web solution in the integration, management, and utilization of TCM information and knowledge resources. As the results,...
Zhaohui Wu, Tong Yu, Huajun Chen, Xiaohong Jiang, ...
WWW
2007
ACM
16 years 5 months ago
Compiling cryptographic protocols for deployment on the web
Cryptographic protocols are useful for trust engineering in Web transactions. The Cryptographic Protocol Programming Language (CPPL) provides a model wherein trust management anno...
Jay A. McCarthy, Shriram Krishnamurthi, Joshua D. ...
KDD
2007
ACM
168views Data Mining» more  KDD 2007»
16 years 5 months ago
Finding tribes: identifying close-knit individuals from employment patterns
We present a family of algorithms to uncover tribes--groups of individuals who share unusual sequences of affiliations. While much work inferring community structure describes lar...
Lisa Friedland, David Jensen
CHI
2007
ACM
16 years 5 months ago
The life and death of online gaming communities: a look at guilds in world of warcraft
Massively multiplayer online games (MMOGs) can be fascinating laboratories to observe group dynamics online. In particular, players must form persistent associations or "guil...
Nicolas Ducheneaut, Nicholas Yee, Eric Nickell, Ro...