Sciweavers

516 search results - page 24 / 104
» Getting the Details Right
Sort
View
148
Voted
SAINT
2008
IEEE
15 years 10 months ago
Performance Measurements and Statistics of Tor Hidden Services
Tor (The Onion Routing) provides a secure mechanism for offering TCP-based services while concealing the hidden server’s IP address. In general the acceptance of services strong...
Karsten Loesing, Werner Sandmann, Christian Wilms,...
SECON
2008
IEEE
15 years 10 months ago
Immunity-Based Epidemic Routing in Intermittent Networks
– In this research, we propose to modify and extend epidemic routing used in intermittent networks. In particular, we propose to include immunity-based information disseminated i...
Padma Mundur, Matthew Seligman, Jin Na Lee
105
Voted
IPPS
2007
IEEE
15 years 9 months ago
Machine Bank: Own Your Virtual Personal Computer
In this paper, we report the design, implementation and experimental results of Machine Bank, a system engineered towards the popular shared-lab scenario, where users outnumber av...
Shuo Tang, Yu Chen, Zheng Zhang
124
Voted
CONTEXT
2007
Springer
15 years 9 months ago
User Profiling with Hierarchical Context: An e-Retailer Case Study
In e-commerce applications, no systematic research has been provided to evaluate if the use of a detailed and rich contextual representation improves the user modeling predictive p...
Cosimo Palmisano, Alexander Tuzhilin, Michele Gorg...
OOPSLA
2007
Springer
15 years 9 months ago
Democratizing the cloud
Programming distributed data-intensive web and mobile applications is gratuitously hard. As the world is moving more and more towards the software as services model, we have to co...
Erik Meijer