Sciweavers

834 search results - page 133 / 167
» Quantifying and Measuring Anonymity
Sort
View
CICLING
2012
Springer
12 years 5 months ago
Core-Periphery Organization of Graphemes in Written Sequences: Decreasing Positional Rigidity with Increasing Core Order
The positional rigidity of graphemes (as well as words considered as single units) in written sequences has been analyzed in this paper using complex network methodology. In partic...
Md. Izhar Ashraf, Sitabhra Sinha
ASPLOS
2010
ACM
14 years 4 months ago
Request behavior variations
A large number of user requests execute (often concurrently) within a server system. A single request may exhibit fluctuating hardware characteristics (such as instruction comple...
Kai Shen
ISW
2009
Springer
14 years 4 months ago
Automated Spyware Collection and Analysis
Various online studies on the prevalence of spyware attest overwhelming numbers (up to 80%) of infected home computers. However, the term spyware is ambiguous and can refer to anyt...
Andreas Stamminger, Christopher Kruegel, Giovanni ...
TRIDENTCOM
2008
IEEE
14 years 4 months ago
Empirical evaluation of VoIP aggregation over a fixed WiMAX testbed
The WiMAX Reference Network Architecture can be used in point-to-point and point-to-multipoint network topologies, and is suitable for providing last-mile, building-to-building, a...
Kostas Pentikousis, Esa Piri, Jarno Pinola, Frerk ...
KDD
2009
ACM
248views Data Mining» more  KDD 2009»
14 years 2 months ago
PSkip: estimating relevance ranking quality from web search clickthrough data
1 In this article, we report our efforts in mining the information encoded as clickthrough data in the server logs to evaluate and monitor the relevance ranking quality of a commer...
Kuansan Wang, Toby Walker, Zijian Zheng