Sciweavers

1275 search results - page 134 / 255
» A Simple Focused Crawler
Sort
View
127
Voted
TCC
2005
Springer
169views Cryptology» more  TCC 2005»
15 years 8 months ago
Chosen-Ciphertext Security of Multiple Encryption
Encryption of data using multiple, independent encryption schemes (“multiple encryption”) has been suggested in a variety of contexts, and can be used, for example, to protect ...
Yevgeniy Dodis, Jonathan Katz
VLDB
2005
ACM
151views Database» more  VLDB 2005»
15 years 8 months ago
Query Execution Assurance for Outsourced Databases
In this paper we propose and analyze a method for proofs of actual query execution in an outsourced database framework, in which a client outsources its data management needs to a...
Radu Sion
WCC
2005
Springer
130views Cryptology» more  WCC 2005»
15 years 8 months ago
On the Design of Codes for DNA Computing
In this paper, we describe a broad class of problems arising in the context of designing codes for DNA computing. We primarily focus on design considerations pertaining to the phen...
Olgica Milenkovic, Navin Kashyap
118
Voted
WINE
2005
Springer
136views Economy» more  WINE 2005»
15 years 8 months ago
Click Fraud Resistant Methods for Learning Click-Through Rates
Abstract. In pay-per-click online advertising systems like Google, Overture, or MSN, advertisers are charged for their ads only when a user clicks on the ad. While these systems ha...
Nicole Immorlica, Kamal Jain, Mohammad Mahdian, Ku...
WINE
2005
Springer
143views Economy» more  WINE 2005»
15 years 8 months ago
An Analysis of Search Engine Switching Behavior Using Click Streams
In this paper, we propose a simple framework to characterize the switching behavior between search engines based on click streams. We segment users into a number of categories bas...
Yun-Fang Juan, Chi-Chao Chang