Sciweavers

613 search results - page 96 / 123
» Event Extent Estimation
Sort
View
CCS
2007
ACM
14 years 1 months ago
How much anonymity does network latency leak?
Low-latency anonymity systems such as Tor, AN.ON, Crowds, and Anonymizer.com aim to provide anonymous connections that are both untraceable by “local” adversaries who control ...
Nicholas Hopper, Eugene Y. Vasserman, Eric Chan-Ti...
P2P
2006
IEEE
229views Communications» more  P2P 2006»
14 years 1 months ago
Cost-Aware Processing of Similarity Queries in Structured Overlays
Large-scale distributed data management with P2P systems requires the existence of similarity operators for queries as we cannot assume that all users will agree on exactly the sa...
Marcel Karnstedt, Kai-Uwe Sattler, Manfred Hauswir...
CEAS
2005
Springer
14 years 1 months ago
Combating Spam through Legislation: A Comparative Analysis of US and European Approaches
Unsolicited Commercial Communication also known as spam - has traditionally been the most visible e-mail threat and has reached a point where it creates a major problem for the de...
Evangelos Moustakas, C. Ranganathan, Penny Duqueno...
CLEF
2005
Springer
14 years 1 months ago
Dictionary-Based Amharic-French Information Retrieval
We present four approaches to the Amharic - French bilingual track at CLEF 2005. All experiments use a dictionary based approach to translate the Amharic queries into French Bags-...
Atelach Alemu Argaw, Lars Asker, Rickard Cöst...
DIAGRAMS
2004
Springer
14 years 29 days ago
Geographic Projection of Cluster Composites
A composite cluster map displays a fuzzy categorisation of geographic areas. It combines information from several sources to provide a visualisation of the significance of cluster...
Peter Kleiweg, John Nerbonne, Leonie Bosveld