Sciweavers

1914 search results - page 347 / 383
» Predicting Web Information Content
Sort
View
IMC
2009
ACM
14 years 3 months ago
One-click hosting services: a file-sharing hideout
File sharing using peer-to-peer (p2p) systems is a major Internet application and the leading source of network traffic today. However, the dominance of p2p systems for file sha...
Demetres Antoniades, Evangelos P. Markatos, Consta...
AH
2008
Springer
14 years 3 months ago
Collection Browsing through Automatic Hierarchical Tagging
In order to navigate huge document collections efficiently, tagged hierarchical structures can be used. For users, it is important to correctly interpret tag combinations. In this ...
Korinna Bade, Marcel Hermkes
CCS
2007
ACM
14 years 2 months ago
How much anonymity does network latency leak?
Low-latency anonymity systems such as Tor, AN.ON, Crowds, and Anonymizer.com aim to provide anonymous connections that are both untraceable by “local” adversaries who control ...
Nicholas Hopper, Eugene Y. Vasserman, Eric Chan-Ti...
RV
2007
Springer
151views Hardware» more  RV 2007»
14 years 2 months ago
Instrumentation of Open-Source Software for Intrusion Detection
A significant number of cyber assaults are attempted against open source internet support software written in C, C++, or Java. Examples of these software packages include the Apac...
William R. Mahoney, William L. Sousan
USITS
1997
13 years 10 months ago
SPAND: Shared Passive Network Performance Discovery
In the Internet today, users and applications must often make decisions based on the performance they expect to receive from other Internet hosts. For example, users can often vie...
Srinivasan Seshan, Mark Stemm, Randy H. Katz