Sciweavers

5119 search results - page 1018 / 1024
» Security Privacy
Sort
View
SIGCOMM
2009
ACM
15 years 4 months ago
Router primitives for programmable active measurement
Active probe-based measurements are the foundation for understanding important network path properties such as SLA compliance and available bandwidth. Well-known challenges in act...
Joel Sommers, Paul Barford, Mark Crovella
CEAS
2005
Springer
15 years 3 months ago
Searching For John Doe: Finding Spammers and Phishers
Microsoft has prosecuted a vigorous civil enforcement campaign against spammers and phishers. When initial investigation into a spam or phishing case fails to reveal the identity ...
Aaron E. Kornblum
HICSS
2003
IEEE
176views Biometrics» more  HICSS 2003»
15 years 2 months ago
Ad-Hoc Association-Rule Mining within the Data Warehouse
Many organizations often underutilize their already constructed data warehouses. In this paper, we suggest a novel way of acquiring more information from corporate data warehouses...
Svetlozar Nestorov, Nenad Jukic
DOCENG
2003
ACM
15 years 2 months ago
UpLib: a universal personal digital library system
We describe the design and use of a personal digital library system, UpLib. The system consists of a full-text indexed repository accessed through an active agent via a Web interf...
William C. Janssen, Kris Popat
CCR
2007
110views more  CCR 2007»
14 years 9 months ago
Future internet research and experimentation: the FIRE initiative
The research community worldwide has increasingly drawn its attention to the weaknesses of the current Internet. Many proposals are addressing the perceived problems, ranging from...
Anastasius Gavras, Arto Karila, Serge Fdida, Marti...
« Prev « First page 1018 / 1024 Last » Next »