Sciweavers

1860 search results - page 260 / 372
» An Internet Based Development Framework for Reconfigurable C...
Sort
View
HT
2005
ACM
14 years 2 months ago
Searching a file system using inferred semantic links
We describe Eureka, a file system search engine that takes into account the inherent relationships among files in order to improve the rankings of search results. The key idea b...
Deepavali Bhagwat, Neoklis Polyzotis
SWS
2004
ACM
14 years 2 months ago
Applying hierarchical and role-based access control to XML documents
W3C Recommendations XML Encryption and XML-Digital Signature can be used to protect the confidentiality of and provide assurances about the integrity of XML documents transmitted...
Jason Crampton
ICNP
2003
IEEE
14 years 2 months ago
Optimal Resource Allocation in Overlay Multicast
This paper targets the problem of optimal resource allocation in overlay multicast, which poses both theoretical and practical challenges. Theoretically, resource allocation among...
Yi Cui, Yuan Xue, Klara Nahrstedt
HT
2010
ACM
14 years 1 months ago
Discovery of information disseminators and receptors on online social media
Today, there is significant sharing of information artifacts among users on various social media sites, including Digg, Twitter and Flickr. An interesting consequence of such ric...
Munmun De Choudhury
NETWORK
2008
94views more  NETWORK 2008»
13 years 8 months ago
Detecting compromised routers via packet forwarding behavior
While it is widely understood that criminal miscreants are subverting large numbers of Internet-connected computers (e.g., for bots, spyware, SPAM forwarding), it is less well app...
Alper Tugay Mizrak, Stefan Savage, Keith Marzullo