Sciweavers

page 59964 / 60054
» publications
Sort
View
BTW
2007
Springer
106views Database» more  BTW 2007»
15 years 4 months ago
Entwurf von Informationsintegrationssystemen auf der Basis der Merkmalsmodellierung
Informationsintegrationssysteme bieten einen integrierten Zugriff auf eine Menge autonomer Datenquellen. Ihr Entwurf erfordert die Abwägung zwischen einer Vielzahl sich zum Teil w...
Susanne Busse, Johann Christoph Freytag
BTW
2007
Springer
245views Database» more  BTW 2007»
15 years 4 months ago
From Personal Desktops to Personal Dataspaces: A Report on Building the iMeMex Personal Dataspace Management System
Abstract: We propose a new system that is able to handle the entire Personal Dataspace of a user. A Personal Dataspace includes all data pertaining to a user on all his disks and o...
Jens-Peter Dittrich, Lukas Blunschi, Markus Fä...
CANS
2007
Springer
150views Cryptology» more  CANS 2007»
15 years 4 months ago
Perfectly Secure Message Transmission in Directed Networks Tolerating Threshold and Non Threshold Adversary
Abstract. In this paper we study Perfectly Secure Message Transmission (PSMT) between a sender S and a receiver R, connected in a directed synchronous network through multiple para...
Arpita Patra, Bhavani Shankar, Ashish Choudhary, K...
CCS
2007
ACM
15 years 4 months ago
Filtering spam with behavioral blacklisting
Spam filters often use the reputation of an IP address (or IP address range) to classify email senders. This approach worked well when most spam originated from senders with fix...
Anirudh Ramachandran, Nick Feamster, Santosh Vempa...
CIKM
2007
Springer
15 years 4 months ago
Optimal proactive caching in peer-to-peer network: analysis and application
As a promising new technology with the unique properties like high efficiency, scalability and fault tolerance, Peer-toPeer (P2P) technology is used as the underlying network to b...
Weixiong Rao, Lei Chen 0002, Ada Wai-Chee Fu, Ying...
« Prev « First page 59964 / 60054 Last » Next »