Sciweavers

323 search results - page 60 / 65
» Improving web services security models
Sort
View
WWW
2006
ACM
14 years 8 months ago
Mining related queries from search engine query logs
In this work we propose a method that retrieves a list of related queries given an initial input query. The related queries are based on the query log of previously issued queries...
Xiaodong Shi, Christopher C. Yang
P2PKM
2004
13 years 9 months ago
A Space-Efficient Model for Sharing Personal Knowledge Objects in Peer Communities
Abstract. In the future it is likely that peer communities will be routinely established for the purpose of sharing electronic resources and targeted information among groups of pe...
Fred S. Annexstein, Kenneth A. Berman
USS
2004
13 years 9 months ago
Tor: The Second-Generation Onion Router
We present Tor, a circuit-based low-latency anonymous communication service. This second-generation Onion Routing system addresses limitations in the original design by adding per...
Roger Dingledine, Nick Mathewson, Paul F. Syverson
ISSA
2004
13 years 9 months ago
A Unified Architecture For Automatic Software Updates
This paper attempts to address the issue of hardening the internal security of an organisation's network by easing its patch management. Traditionally security has been model...
Dominic White
W4A
2006
ACM
14 years 1 months ago
Evaluating interfaces for intelligent mobile search
Recent developments in the mobile phone market have led to a significant increase in the number of users accessing the Mobile Internet. Handsets have been improved to support a d...
Karen Church, Barry Smyth, Mark T. Keane