Sciweavers

132 search results - page 18 / 27
» Ajaxifying Classic Web Applications
Sort
View
IEEEARES
2007
IEEE
14 years 2 months ago
Compartmented Security for Browsers - Or How to Thwart a Phisher with Trusted Computing
Identity theft through phishing attacks has become a major concern for Internet users. Typically, phishing attacks aim at luring the user to a faked web site to disclose personal ...
Sebastian Gajek, Ahmad-Reza Sadeghi, Christian St&...
WWW
2010
ACM
14 years 2 months ago
Web-scale k-means clustering
We present two modifications to the popular k-means clustering algorithm to address the extreme requirements for latency, scalability, and sparsity encountered in user-facing web...
D. Sculley
ICON
2007
IEEE
14 years 2 months ago
A Cache Architecture for Counting Bloom Filters
— Within packet processing systems, lengthy memory accesses greatly reduce performance. To overcome this limitation, network processors utilize many different techniques, e.g., u...
Mahmood Ahmadi, Stephan Wong
ICTAI
2006
IEEE
14 years 1 months ago
Sequence Mining Without Sequences: A New Way for Privacy Preserving
During the last decade, sequential pattern mining has been the core of numerous researches. It is now possible to efficiently discover users’ behavior in various domains such a...
Stéphanie Jacquemont, François Jacqu...
CBSE
2006
Springer
13 years 11 months ago
Generic Component Lookup
The possibilities currently offered to conduct business at an electronic level are immense. Service providers offer access to their attendances through components placed on the Int...
Till G. Bay, Patrick Th. Eugster, Manuel Oriol