Sciweavers

1852 search results - page 27 / 371
» Block-level link analysis
Sort
View
ISOLA
2010
Springer
13 years 8 months ago
A Linked Data Approach to Sharing Workflows and Workflow Results
A bioinformatics analysis pipeline is often highly elaborate, due to the inherent complexity of biological systems and the variety and size of laboratory publications would be high...
Marco Roos, Sean Bechhofer, Jun Zhao, Paolo Missie...
CCS
2008
ACM
13 years 12 months ago
Dependent link padding algorithms for low latency anonymity systems
Low latency anonymity systems are susceptive to traffic analysis attacks. In this paper, we propose a dependent link padding scheme to protect anonymity systems from traffic analy...
Wei Wang 0002, Mehul Motani, Vikram Srinivasan
DDEP
2000
Springer
14 years 2 months ago
A Link-Oriented Comparison of Hyperdocuments and Programs
There are parallels between the construction of programs and the construction of hypertexts, and in ar between the abstractions available to the application programmer and those a...
Heather Brown, Peter J. Brown, Les Carr, Wendy Hal...
CORR
2010
Springer
164views Education» more  CORR 2010»
13 years 10 months ago
Performance Comparison of Link, Node and Zone Disjoint Multi-path Routing Strategies and Minimum Hop Single Path Routing for Mob
The high-level contribution of this paper is a simulation-based analysis to evaluate the tradeoffs between lifetime and hop count of link-disjoint, node-disjoint and zone-disjoint...
Natarajan Meghanathan
TELSYS
2010
132views more  TELSYS 2010»
13 years 4 months ago
Defending the weakest link: phishing websites detection by analysing user behaviours
Phishing detection systems are principally based on the analysis of data moving from phishers to victims. In this paper we describe a novel approach for detecting phishing websites...
Xun Dong, John A. Clark, Jeremy L. Jacob