Sciweavers

4435 search results - page 753 / 887
» Networking named content
Sort
View
103
Voted
CMS
2010
138views Communications» more  CMS 2010»
15 years 4 months ago
Tor HTTP Usage and Information Leakage
This paper analyzes the web browsing behaviour of Tor users. By collecting HTTP requests we show which websites are of interest to Tor users and we determined an upper bound on how...
Marcus Huber, Martin Mulazzani, Edgar Weippl
109
Voted
DAIS
2010
15 years 4 months ago
RESTful Integration of Heterogeneous Devices in Pervasive Environments
Abstract. More and more home devices are equipped with advanced computational capabilities to improve the user satisfaction (e.g., programmable heating system, Internet TV). Althou...
Daniel Romero 0002, Gabriel Hermosillo, Amirhosein...
112
Voted
LREC
2010
221views Education» more  LREC 2010»
15 years 4 months ago
KALAKA: A TV Broadcast Speech Database for the Evaluation of Language Recognition Systems
A speech database, named KALAKA, was created to support the Albayzin 2008 Evaluation of Language Recognition Systems, organized by the Spanish Network on Speech Technologies from ...
Luis Javier Rodríguez-Fuentes, Mikel Pe&nti...
163
Voted
ISSA
2008
15 years 4 months ago
Immune System Based Intrusion Detection System
The threats and intrusions in IT systems can basically be compared to human diseases with the difference that the human body has an effective way to deal with them, what still nee...
Christoph Ehret, Ulrich Ultes-Nitsche
IADIS
2004
15 years 4 months ago
Dimensions of Facilitators for Non-Business E-Commerce Adoption
Non-business EC is a relatively new research niche in the general e-commerce stream. It denotes the use of e-commerce by non-business institutions such as academic institutions (a...
Nelson Oly Ndubisi, M. A. Masmurniwati