Sciweavers

325 search results - page 44 / 65
» Designing Good Deceptions in Defense of Information Systems
Sort
View
NSDI
2008
13 years 10 months ago
One Hop Reputations for Peer to Peer File Sharing Workloads
An emerging paradigm in peer-to-peer (P2P) networks is to explicitly consider incentives as part of the protocol design in order to promote good (or discourage bad) behavior. Howe...
Michael Piatek, Tomas Isdal, Arvind Krishnamurthy,...
LISA
2001
13 years 9 months ago
ScanSSH: Scanning the Internet for SSH Servers
SSH is a widely used application that provides secure remote login. It uses strong cryptography to provide authentication and confidentiality. The IETF SecSH working group is deve...
Niels Provos, Peter Honeyman
SECON
2007
IEEE
14 years 1 months ago
Coverage Protocol for Wireless Sensor Networks Using Distance Estimates
— In wireless sensor networks, it is desirable to maintain good sensing coverage while keeping the number of active sensor nodes small to achieve long system lifetime. Existing c...
Mingze Zhang, Mun Choon Chan, Akkihebbal L. Ananda
SEMCO
2007
IEEE
14 years 1 months ago
Intelligent Parsing of Scanned Volumes for Web Based Archives
The proliferation of digital libraries and the large amount of existing documents raise important issues in efficient handling of documents. Printed texts in documents need to be...
Xiaonan Lu, James Ze Wang, C. Lee Giles
WIDM
2004
ACM
14 years 1 months ago
WISE-cluster: clustering e-commerce search engines automatically
In this paper, we propose a new approach to automatically clustering e-commerce search engines (ESEs) on the Web such that ESEs in the same cluster sell similar products. This all...
Qian Peng, Weiyi Meng, Hai He, Clement T. Yu