Sciweavers

2316 search results - page 380 / 464
» How Asymmetric Is the Internet
Sort
View
WIDM
2004
ACM
15 years 10 months ago
Querying structured data in an unstructured P2P system
Abstract— Peer-to-Peer networking has become a major research topic over the last few years. Sharing of structured data in such decentralized environments is a challenging proble...
Verena Kantere, Dimitrios Tsoumakos, Nick Roussopo...
WIDM
2004
ACM
15 years 10 months ago
Stylistic and lexical co-training for web block classification
Many applications which use web data extract information from a limited number of regions on a web page. As such, web page division into blocks and the subsequent block classifica...
Chee How Lee, Min-Yen Kan, Sandra Lai
151
Voted
WPES
2004
ACM
15 years 10 months ago
Off-the-record communication, or, why not to use PGP
Quite often on the Internet, cryptography is used to protect private, personal communications. However, most commonly, systems such as PGP are used, which use long-lived encryptio...
Nikita Borisov, Ian Goldberg, Eric A. Brewer
ACNS
2004
Springer
142views Cryptology» more  ACNS 2004»
15 years 10 months ago
S-RIP: A Secure Distance Vector Routing Protocol
Distance vector routing protocols (e.g., RIP) have been widely used on the Internet, and are being adapted to emerging wireless ad hoc networks. However, it is well-known that exis...
Tao Wan, Evangelos Kranakis, Paul C. van Oorschot
AH
2004
Springer
15 years 10 months ago
The Personal Reader: Personalizing and Enriching Learning Resources Using Semantic Web Technologies.
Traditional adaptive hypermedia systems have focused on providing adaptation functionality on a closed corpus, while Web search interfaces have delivered non-personalized informati...
Peter Dolog, Nicola Henze, Wolfgang Nejdl, Michael...