Sciweavers

631 search results - page 31 / 127
» Improving Internet interaction: From theory to practice
Sort
View
CHI
2007
ACM
14 years 9 months ago
Protecting people from phishing: the design and evaluation of an embedded training email system
Phishing attacks, in which criminals lure Internet users to websites that impersonate legitimate sites, are occurring with increasing frequency and are causing considerable harm t...
Ponnurangam Kumaraguru, Yong Rhee, Alessandro Acqu...
WWW
2009
ACM
14 years 10 months ago
Towards context-aware search by learning a very large variable length hidden markov model from search logs
Capturing the context of a user's query from the previous queries and clicks in the same session may help understand the user's information need. A context-aware approac...
Huanhuan Cao, Daxin Jiang, Jian Pei, Enhong Chen, ...
IJCOMSYS
2007
88views more  IJCOMSYS 2007»
13 years 9 months ago
Potential performance bottleneck in Linux TCP
TCP is the most widely used transport protocol on the Internet today. Over the years, especially recently, due to requirements of high bandwidth transmission, various approaches h...
Wenji Wu, Matt Crawford
IEEECIT
2006
IEEE
14 years 3 months ago
Improving Resiliency of Network Topology with Enhanced Evolving Strategies
— Recent studies have shown that many real networks follow the power-law distribution of node degrees. Instead of random connectivity, however, power-law connectivity suffers fro...
Soo Kim, Heejo Lee, Wan Yeon Lee
SIGMETRICS
2003
ACM
119views Hardware» more  SIGMETRICS 2003»
14 years 2 months ago
Incrementally improving lookup latency in distributed hash table systems
Distributed hash table (DHT) systems are an important class of peer-to-peer routing infrastructures. They enable scalable wide-area storage and retrieval of information, and will ...
Hui Zhang 0002, Ashish Goel, Ramesh Govindan