Sciweavers

1308 search results - page 201 / 262
» Performance and extension of user space file systems
Sort
View
PET
2007
Springer
15 years 4 months ago
Browser-Based Attacks on Tor
This paper describes a new attack on the anonymity of web browsing with Tor. The attack tricks a user’s web browser into sending a distinctive signal over the Tor network that ca...
Timothy G. Abbott, Katherine J. Lai, Michael R. Li...
RECSYS
2009
ACM
15 years 2 months ago
The impact of ambiguity and redundancy on tag recommendation in folksonomies
Collaborative tagging applications have become a popular tool allowing Internet users to manage online resources with tags. Most collaborative tagging applications permit unsuperv...
Jonathan Gemmell, Maryam Ramezani, Thomas Schimole...
IDMS
2001
Springer
133views Multimedia» more  IDMS 2001»
15 years 2 months ago
An Access Control Architecture for Metropolitan Area Wireless Networks
This paper introduces a novel access control architecture for publicly accessible, wireless networks. The architecture was designed to address the requirements obtained from a case...
Stefan Schmid, Joe Finney, Maomao Wu, Adrian Frida...
VLDB
1998
ACM
142views Database» more  VLDB 1998»
15 years 2 months ago
On the Discovery of Interesting Patterns in Association Rules
Many decision support systems, which utilize association rules for discovering interesting patterns, require the discovery of association rules that vary over time. Such rules des...
Sridhar Ramaswamy, Sameer Mahajan, Abraham Silbers...
ECIS
2004
14 years 11 months ago
Measurement of user-perceived web quality
Web sites are now considered an extension of the entire business, not just an additional channel or storefront or a simple information portal for the company. Creating an effectiv...
Ravi T. Seethamraju