Background: With the current technological advances in high-throughput biology, the necessity to develop tools that help to analyse the massive amount of data being generated is e...
Maciej Paszkowski-Rogacz, Mikolaj Slabicki, M. Ter...
Popular Internet applications deploy a multi-tier architecture, with each tier provisioning a certain functionality to its preceding tier. In this paper, we address the challengin...
The onion routing network Tor is undoubtedly the most widely employed technology for anonymous web access. Although the underlying onion routing (OR) protocol appears satisfactory...
Michael Backes, Ian Goldberg, Aniket Kate, Esfandi...
Trust plays important roles in diverse decentralized environments, including our society at large. Computational trust models help to, for instance, guide users’ judgements in o...
Xin Liu, Anwitaman Datta, Krzysztof Rzadca, Ee-Pen...
Web search is generally motivated by an information need. Since asking well-formulated questions is the fastest and the most natural way to obtain information for human beings, al...