Sciweavers

3639 search results - page 684 / 728
» Experiments on IPv6 Testing
Sort
View
CCS
2006
ACM
13 years 11 months ago
An effective defense against email spam laundering
Laundering email spam through open-proxies or compromised PCs is a widely-used trick to conceal real spam sources and reduce spamming cost in underground email spam industry. Spam...
Mengjun Xie, Heng Yin, Haining Wang
CIKM
2006
Springer
13 years 11 months ago
A probabilistic relevance propagation model for hypertext retrieval
A major challenge in developing models for hypertext retrieval is to effectively combine content information with the link structure available in hypertext collections. Although s...
Azadeh Shakery, ChengXiang Zhai
CIVR
2006
Springer
13 years 11 months ago
Query by Semantic Example
A combination of query-by-visual-example (QBVE) and semantic retrieval (SR), denoted as query-by-semantic-example (QBSE), is proposed. Images are labeled with respect to a vocabula...
Nikhil Rasiwasia, Nuno Vasconcelos, Pedro J. Moren...
DSN
2006
IEEE
13 years 11 months ago
A Contribution Towards Solving the Web Workload Puzzle
World Wide Web, the biggest distributed system ever built, experiences tremendous growth and change in Web sites, users, and technology. A realistic and accurate characterization ...
Katerina Goseva-Popstojanova, Fengbin Li, Xuan Wan...
EUPROJECTS
2006
Springer
13 years 11 months ago
Human Computer Confluence
Pervasive Computing has postulated to invisibly integrate technology into everyday objects in such a way, that these objects turn into smart things. Not only a single object of thi...
Alois Ferscha, Stefan Resmerita, Clemens Holzmann