Sciweavers

3895 search results - page 648 / 779
» Measuring the effectiveness of ACATS
Sort
View
ESORICS
2009
Springer
16 years 5 months ago
Content Delivery Networks: Protection or Threat?
Content Delivery Networks (CDNs) are commonly believed to offer their customers protection against application-level denial of service (DoS) attacks. Indeed, a typical CDN with its...
Sipat Triukose, Zakaria Al-Qudah, Michael Rabinovi...
CHI
2009
ACM
16 years 5 months ago
Simulated augmented reality windshield display as a cognitive mapping aid for elder driver navigation
A common effect of aging is decline in spatial cognition. This is an issue for all elders, but particularly for elder drivers. To address this driving issue, we propose a novel co...
Seungjun Kim, Anind K. Dey
EUROCRYPT
2009
Springer
16 years 5 months ago
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
The fair evaluation and comparison of side-channel attacks and countermeasures has been a long standing open question, limiting further developments in the field. Motivated by this...
François-Xavier Standaert, Moti Yung, Tal M...
KDD
2009
ACM
185views Data Mining» more  KDD 2009»
16 years 5 months ago
On compressing social networks
Motivated by structural properties of the Web graph that support efficient data structures for in memory adjacency queries, we study the extent to which a large network can be com...
Flavio Chierichetti, Ravi Kumar, Silvio Lattanzi, ...
118
Voted
KDD
2009
ACM
192views Data Mining» more  KDD 2009»
16 years 5 months ago
Co-evolution of social and affiliation networks
In our work, we address the problem of modeling social network generation which explains both link and group formation. Recent studies on social network evolution propose generati...
Elena Zheleva, Hossam Sharara, Lise Getoor