Sciweavers

8772 search results - page 1604 / 1755
» Business Services Networks
Sort
View
TON
2012
12 years 1 months ago
A New Cell-Counting-Based Attack Against Tor
Abstract—Various low-latency anonymous communication systems such as Tor and Anonymizer have been designed to provide anonymity service for users. In order to hide the communicat...
Zhen Ling, Junzhou Luo, Wei Yu, Xinwen Fu, Dong Xu...
AAAI
2008
14 years 1 months ago
RADAR: A Personal Assistant that Learns to Reduce Email Overload
Email client software is widely used for personal task management, a purpose for which it was not designed and is poorly suited. Past attempts to remedy the problem have focused o...
Michael Freed, Jaime G. Carbonell, Geoffrey J. Gor...
IMC
2007
ACM
14 years 10 days ago
I tube, you tube, everybody tubes: analyzing the world's largest user generated content video system
User Generated Content (UGC) is re-shaping the way people watch video and TV, with millions of video producers and consumers. In particular, UGC sites are creating new viewing pat...
Meeyoung Cha, Haewoon Kwak, Pablo Rodriguez, Yong-...
ACMSE
2008
ACM
14 years 24 days ago
Gnutella: integrating performance and security in fully decentralized P2P models
Peer-To-Peer (P2P) systems have made an enormous impact on the Internet, directly affecting its performance and security. The litigation against P2P file sharing has led some desi...
Rossana Motta, Wickus Nienaber, Jon Jenkins
WWW
2005
ACM
14 years 11 months ago
Analysis of multimedia workloads with implications for internet streaming
In this paper, we study the media workload collected from a large number of commercial Web sites hosted by a major ISP and that collected from a large group of home users connecte...
Lei Guo, Songqing Chen, Zhen Xiao, Xiaodong Zhang
« Prev « First page 1604 / 1755 Last » Next »