Sciweavers

2842 search results - page 531 / 569
» Expansion and Search in Networks
Sort
View
CAI
2011
Springer
13 years 5 months ago
Email Analysis and Information Extraction for Enterprise Benefit
In spite of rapid advances in multimedia and interactive technologies, enterprise users prefer to battle with email spam and overload rather than lose the benefits of communicatin...
Michal Laclavik, Stefan Dlugolinsky, Martin Seleng...
WWW
2011
ACM
13 years 5 months ago
Heat-seeking honeypots: design and experience
Many malicious activities on the Web today make use of compromised Web servers, because these servers often have high pageranks and provide free resources. Attackers are therefore...
John P. John, Fang Yu, Yinglian Xie, Arvind Krishn...
JAMIA
2010
76views more  JAMIA 2010»
13 years 4 months ago
The inadvertent disclosure of personal health information through peer-to-peer file sharing programs
Objective There has been a consistent concern about the inadvertent disclosure of personal information through peer-to-peer file sharing applications, such as Limewire and Morpheu...
Khaled El Emam, Emilio Neri, Elizabeth Jonker, Mar...
JCIT
2010
181views more  JCIT 2010»
13 years 4 months ago
Geospatial Web Services Semantic Discovery Approach Using Quality
The use of geographic data through Web services shows the geospatial Web Services (GWS). A growing number of GWS designed to interoperate spatial information over the network have...
Rezeg Khaled, Laskri Mohamed Tayeb, Sylvie Servign...
TSMC
2010
13 years 4 months ago
Bio-inspired Algorithms for Autonomous Deployment and Localization of Sensor Nodes
Abstract--Optimal deployment and accurate localization of sensor nodes have a strong influence on the performance of a wireless sensor network (WSN). This paper considers real-time...
Raghavendra V. Kulkarni, Ganesh K. Venayagamoorthy