Sciweavers

2409 search results - page 393 / 482
» Reverse engineering the Internet
Sort
View
111
Voted
CCR
2011
14 years 7 months ago
HTTP in the home: it is not just about PCs
HTTP (Hypertext Transport Protocol) was originally primarily used for human-initiated client-server communications launched from web browsers, traditional computers and laptops. H...
Jeffrey Erman, Alexandre Gerber, Subhabrata Sen
119
Voted
CCR
2011
14 years 7 months ago
IP geolocation databases: unreliable?
The most widely used technique for IP geolocation consists in building a database to keep the mapping between IP blocks and a geographic location. Several databases are available ...
Ingmar Poese, Steve Uhlig, Mohamed Ali Kâafa...
112
Voted
CROSSROADS
2010
14 years 7 months ago
Massive multiplayer human computation for fun, money, and survival
Crowdsourcing is an effective tool to solve hard tasks. By bringing 100,000s of people to work on simple tasks that only humans can do, we can go far beyond traditional models of ...
Lukas Biewald
100
Voted
SOUPS
2006
ACM
15 years 6 months ago
Power strips, prophylactics, and privacy, oh my!
While Internet users claim to be concerned about online privacy, their behavior rarely reflects those concerns. In this paper we investigate whether the availability of compariso...
Julia Gideon, Lorrie Faith Cranor, Serge Egelman, ...
WEBDB
2005
Springer
88views Database» more  WEBDB 2005»
15 years 6 months ago
Vague Content and Structure (VCAS) Retrieval for Document-centric XML Collections
Querying document-centric XML collections with structure conditions improves retrieval precisions. The structures of such XML collections, however, are often too complex for users...
Shaorong Liu, Wesley W. Chu, Ruzan Shahinian