Sciweavers

865 search results - page 117 / 173
» Performance Engineering Evaluation of Object-Oriented System...
Sort
View
CCS
2009
ACM
15 years 1 months ago
The bayesian traffic analysis of mix networks
This work casts the traffic analysis of anonymity systems, and in particular mix networks, in the context of Bayesian inference. A generative probabilistic model of mix network ar...
Carmela Troncoso, George Danezis
RANLP
2003
14 years 11 months ago
A framework for named entity recognition in the open domain
In this paper, a system for Named Entity Recognition in the Open domain (NERO) is described. It is concerned with recognition of various types of entity, types that will be approp...
Richard J. Evans
SAC
2008
ACM
14 years 9 months ago
Conflict-aware load-balancing techniques for database replication
Middleware-based database replication protocols require few or no changes in the database engine. As a consequence, they are more portable and flexible than kernel-based protocols...
Vaide Zuikeviciute, Fernando Pedone
EDBTW
2004
Springer
15 years 3 months ago
P2PR-Tree: An R-Tree-Based Spatial Index for Peer-to-Peer Environments
Abstract. The unprecedented growth and increased importance of geographically distributed spatial data has created a strong need for efficient sharing of such data. Interestingly, ...
Anirban Mondal, Yi Lifu, Masaru Kitsuregawa
DIMVA
2009
14 years 11 months ago
Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks
Drive-by download attacks are among the most common methods for spreading malware today. These attacks typically exploit memory corruption vulnerabilities in web browsers and brows...
Manuel Egele, Peter Wurzinger, Christopher Kruegel...