Sciweavers

422 search results - page 45 / 85
» Walking the Web of Trust
Sort
View
ERCIMDL
2008
Springer
122views Education» more  ERCIMDL 2008»
15 years 1 months ago
Improving Temporal Language Models for Determining Time of Non-timestamped Documents
Taking the temporal dimension into account in searching, i.e., using time of content creation as part of the search condition, is now gaining increasingly interest. However, in the...
Nattiya Kanhabua, Kjetil Nørvåg
ICPPW
2003
IEEE
15 years 5 months ago
Countering Rogues in Wireless Networks
Wired networks are prone to the same attacks as wireless ones, including sniffing, spoofing and Man-in-the-middle attacks (MITM). In this paper we show how wireless networks are...
Austin Godber, Partha Dasgupta
ICICS
2005
Springer
15 years 5 months ago
Remotely Keyed Cryptographics Secure Remote Display Access Using (Mostly) Untrusted Hardware
Software that covertly monitors a user’s actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and remov...
Debra L. Cook, Ricardo A. Baratto, Angelos D. Kero...
INFOCOM
2006
IEEE
15 years 5 months ago
Performance of Full Text Search in Structured and Unstructured Peer-to-Peer Systems
— While structured P2P systems (such as DHTs) are often regarded as an improvement over unstructured P2P systems (such as super-peer networks) in terms of routing efficiency, it...
Yong Yang, Rocky Dunlap, Mike Rexroad, Brian F. Co...
ICMCS
2009
IEEE
131views Multimedia» more  ICMCS 2009»
14 years 9 months ago
Web image mining using concept sensitive Markov stationary features
With the explosive growth of web resources, how to mine semantically relevant images efficiently becomes a challenging and necessary task. In this paper, we propose a concept sens...
Chunjie Zhang, Jing Liu, Hanqing Lu, Songde Ma