Sciweavers

433 search results - page 61 / 87
» Administrative and Public Verifiability: Can We Have Both
Sort
View
CCS
2007
ACM
14 years 1 months ago
How much anonymity does network latency leak?
Low-latency anonymity systems such as Tor, AN.ON, Crowds, and Anonymizer.com aim to provide anonymous connections that are both untraceable by “local” adversaries who control ...
Nicholas Hopper, Eugene Y. Vasserman, Eric Chan-Ti...
KDD
2004
ACM
157views Data Mining» more  KDD 2004»
14 years 27 days ago
On detecting space-time clusters
Detection of space-time clusters is an important function in various domains (e.g., epidemiology and public health). The pioneering work on the spatial scan statistic is often use...
Vijay S. Iyengar
EP
1998
Springer
13 years 11 months ago
Dynamic Link Inclusion in Online PDF Journals
Two complementary de facto standards for the publication of electronic documents are HTML on the World Wide Web and Adobe's PDF (Portable Document Format) language for use wi...
Steve G. Probets, David F. Brailsford, Les Carr, W...
DSN
2009
IEEE
13 years 11 months ago
HC-BGP: A light-weight and flexible scheme for securing prefix ownership
The Border Gateway Protocol (BGP) is a fundamental building block of the Internet infrastructure. However, due to the implicit trust assumption among networks, Internet routing re...
Ying Zhang, Zheng Zhang, Zhuoqing Morley Mao, Y. C...
GIL
2009
13 years 5 months ago
A Software Package for Managing and Evaluating DNA Sequence and Microsatellite Data
Abstract: We have surveyed three molecular biology labs in Germany and Vietnam to evaluate practical problems in the management of molecular genetics data. These labs are generatin...
Truong Van Chi Cong, Zhivko Duchev, Eildert Groene...