Sciweavers

861 search results - page 150 / 173
» Ranking Privacy Policy
Sort
View
CCS
2006
ACM
15 years 1 months ago
Hot or not: revealing hidden services by their clock skew
Location-hidden services, as offered by anonymity systems such as Tor, allow servers to be operated under a pseudonym. As Tor is an overlay network, servers hosting hidden service...
Steven J. Murdoch
DIM
2005
ACM
14 years 11 months ago
Pseudonym management using mediated identity-based cryptography
Mobile Location-Based Services (LBS) have raised privacy concerns amongst mobile phone users who may need to supply their identity and location information to untrustworthy third ...
Thibault Candebat, Cameron Ross Dunne, David T. Gr...
117
Voted
ICETE
2004
253views Business» more  ICETE 2004»
14 years 11 months ago
BLAZE: A Mobile Agent Paradigm for VoIP Intrusion Detection Systems
ser provides abstraction for supporting flexible security policies that can be developed using the low-level primitives of the browser. We believe our browser architecture will be ...
Kapil Singh, Son T. Vuong
MCS
2008
Springer
14 years 9 months ago
Estimation of cost efficiency of Australian universities
The purpose of this paper is to quantify the efficiency with which Australian universities utilise their teaching resources. The study estimates the cost efficiency of 36 universi...
Jocelyn Horne, Baiding Hu
TSMC
2008
132views more  TSMC 2008»
14 years 9 months ago
Ensemble Algorithms in Reinforcement Learning
This paper describes several ensemble methods that combine multiple different reinforcement learning (RL) algorithms in a single agent. The aim is to enhance learning speed and fin...
Marco A. Wiering, Hado van Hasselt