Sciweavers

2060 search results - page 368 / 412
» Performability Evaluation of Networked Storage Systems Using...
Sort
View
220
Voted
SIGMOD
2007
ACM
229views Database» more  SIGMOD 2007»
16 years 4 months ago
Spark: top-k keyword query in relational databases
With the increasing amount of text data stored in relational databases, there is a demand for RDBMS to support keyword queries over text data. As a search result is often assemble...
Yi Luo, Xuemin Lin, Wei Wang 0011, Xiaofang Zhou
145
Voted
SAC
2010
ACM
15 years 10 months ago
CAPTCHA smuggling: hijacking web browsing sessions to create CAPTCHA farms
CAPTCHAs protect online resources and services from automated access. From an attacker’s point of view, they are typically perceived as an annoyance that prevents the mass creat...
Manuel Egele, Leyla Bilge, Engin Kirda, Christophe...
117
Voted
POLICY
2004
Springer
15 years 9 months ago
Cassandra: Distributed Access Control Policies with Tunable Expressiveness
We study the specification of access control policy in large-scale distributed systems. Our work on real-world policies has shown that standard policy idioms such as role hierarc...
Moritz Y. Becker, Peter Sewell
INFOCOM
2012
IEEE
13 years 6 months ago
Reverse-engineering BitTorrent: A Markov approximation perspective
Abstract—BitTorrent has been the most popular P2P (Peer-toPeer) paradigm during recent years. Built upon great intuition, the piece-selection and neighbor-selection modules roote...
Ziyu Shao, Hao Zhang, Minghua Chen, Kannan Ramchan...
150
Voted
WWW
2010
ACM
15 years 11 months ago
Keyword extraction for social snippets
Today, a huge amount of text is being generated for social purposes on social networking services on the Web. Unlike traditional documents, such text is usually extremely short an...
Zhenhui Li, Ding Zhou, Yun-Fang Juan, Jiawei Han