Sciweavers

1551 search results - page 7 / 311
» How Typical is the
Sort
View
IEEEARES
2007
IEEE
14 years 1 months ago
Compartmented Security for Browsers - Or How to Thwart a Phisher with Trusted Computing
Identity theft through phishing attacks has become a major concern for Internet users. Typically, phishing attacks aim at luring the user to a faked web site to disclose personal ...
Sebastian Gajek, Ahmad-Reza Sadeghi, Christian St&...
WPES
2006
ACM
14 years 1 months ago
Private social network analysis: how to assemble pieces of a graph privately
Connections in distributed systems, such as social networks, online communities or peer-to-peer networks, form complex graphs. These graphs are of interest to scientists in field...
Keith B. Frikken, Philippe Golle
OTM
2005
Springer
14 years 26 days ago
Biomedical Retrieval: How Can a Thesaurus Help?
Abstract. Searching specialized collections, such as biomedical literature, typically requires intimate knowledge of a specialized terminology. Hence, it can be a disappointing exp...
Leonie IJzereef, Jaap Kamps, Maarten de Rijke
CIVR
2007
Springer
158views Image Analysis» more  CIVR 2007»
13 years 11 months ago
How many high-level concepts will fill the semantic gap in news video retrieval?
A number of researchers have been building high-level semantic concept detectors such as outdoors, face, building, etc., to help with semantic video retrieval. Using the TRECVID v...
Alexander G. Hauptmann, Rong Yan, Wei-Hao Lin
CONEXT
2008
ACM
13 years 9 months ago
Uplink allocation beyond choke/unchoke: or how to divide and conquer best
Motivated by emerging cooperative P2P applications we study new uplink allocation algorithms for substituting the ratebased choke/unchoke algorithm of BitTorrent which was develop...
Nikolaos Laoutaris, Damiano Carra, Pietro Michiard...