Sciweavers

4435 search results - page 753 / 887
» Networking named content
Sort
View
CMS
2010
138views Communications» more  CMS 2010»
13 years 11 months ago
Tor HTTP Usage and Information Leakage
This paper analyzes the web browsing behaviour of Tor users. By collecting HTTP requests we show which websites are of interest to Tor users and we determined an upper bound on how...
Marcus Huber, Martin Mulazzani, Edgar Weippl
DAIS
2010
13 years 11 months ago
RESTful Integration of Heterogeneous Devices in Pervasive Environments
Abstract. More and more home devices are equipped with advanced computational capabilities to improve the user satisfaction (e.g., programmable heating system, Internet TV). Althou...
Daniel Romero 0002, Gabriel Hermosillo, Amirhosein...
LREC
2010
221views Education» more  LREC 2010»
13 years 11 months ago
KALAKA: A TV Broadcast Speech Database for the Evaluation of Language Recognition Systems
A speech database, named KALAKA, was created to support the Albayzin 2008 Evaluation of Language Recognition Systems, organized by the Spanish Network on Speech Technologies from ...
Luis Javier Rodríguez-Fuentes, Mikel Pe&nti...
ISSA
2008
13 years 11 months ago
Immune System Based Intrusion Detection System
The threats and intrusions in IT systems can basically be compared to human diseases with the difference that the human body has an effective way to deal with them, what still nee...
Christoph Ehret, Ulrich Ultes-Nitsche
IADIS
2004
13 years 11 months ago
Dimensions of Facilitators for Non-Business E-Commerce Adoption
Non-business EC is a relatively new research niche in the general e-commerce stream. It denotes the use of e-commerce by non-business institutions such as academic institutions (a...
Nelson Oly Ndubisi, M. A. Masmurniwati