Sciweavers

759 search results - page 129 / 152
» Creating social networks to improve peer-to-peer networking
Sort
View
CORR
2011
Springer
199views Education» more  CORR 2011»
12 years 11 months ago
Surrogate Parenthood: Protected and Informative Graphs
Many applications, including provenance and some analyses of social networks, require path-based queries over graphstructured data. When these graphs contain sensitive information...
Barbara T. Blaustein, Adriane Chapman, Len Seligma...
CSUR
1999
159views more  CSUR 1999»
13 years 7 months ago
Hubs, authorities, and communities
The Web can be naturally modeled as a directed graph, consisting of a set of abstract nodes (the pages) joined by directional edges (the hyperlinks). Hyperlinks encode a considerab...
Jon M. Kleinberg
FLAIRS
2006
13 years 9 months ago
Learning Personalized Query Modifications
The continuous development of the Internet has resulted in an exponential increase in the amount of available information. A popular way to access this information is by submittin...
Erika E. Torres-Verdín, Manfred Huber
NDSS
2009
IEEE
14 years 2 months ago
Recursive DNS Architectures and Vulnerability Implications
DNS implementers face numerous choices in architecting DNS resolvers, each with profound implications for security. Absent the use of DNSSEC, there are numerous interim techniques...
David Dagon, Manos Antonakakis, Kevin Day, Xiapu L...
DSN
2008
IEEE
14 years 2 months ago
Using likely program invariants to detect hardware errors
In the near future, hardware is expected to become increasingly vulnerable to faults due to continuously decreasing feature size. Software-level symptoms have previously been used...
Swarup Kumar Sahoo, Man-Lap Li, Pradeep Ramachandr...