Sciweavers

1834 search results - page 353 / 367
» Public Key Cryptography
Sort
View
CIDR
2003
218views Algorithms» more  CIDR 2003»
13 years 9 months ago
Indexing Large Trajectory Data Sets With SETI
With the rapid increase in the use of inexpensive, location-aware sensors in a variety of new applications, large amounts of time-sequenced location data will soon be accumulated....
V. Prasad Chakka, Adam Everspaugh, Jignesh M. Pate...
USS
2004
13 years 9 months ago
Tor: The Second-Generation Onion Router
We present Tor, a circuit-based low-latency anonymous communication service. This second-generation Onion Routing system addresses limitations in the original design by adding per...
Roger Dingledine, Nick Mathewson, Paul F. Syverson
KRDB
1998
93views Database» more  KRDB 1998»
13 years 9 months ago
Intelligent Caching for Information Mediators: A KR Based Approach
We present a semantic caching approach for optimizing the performance of information mediators. A critical problem with information mediators, particularly those gathering and int...
Naveen Ashish, Craig A. Knoblock, Cyrus Shahabi
DOCENG
2010
ACM
13 years 8 months ago
Contextual advertising for web article printing
: Contextual Advertising for Web Article Printing Shengwen Yang, Jianming Jin, Parag Joshi, Sam Liu HP Laboratories HPL-2010-79 printed ad, web printing, article extraction, conte...
Shengwen Yang, Jianming Jin, Joshi Parag, Sam Liu
HPDC
2010
IEEE
13 years 8 months ago
Mendel: efficiently verifying the lineage of data modified in multiple trust domains
Data is routinely created, disseminated, and processed in distributed systems that span multiple administrative domains. To maintain accountability while the data is transformed b...
Ashish Gehani, Minyoung Kim