Sciweavers

2269 search results - page 401 / 454
» Query Incentive Networks
Sort
View
110
Voted
NDSS
2008
IEEE
15 years 8 months ago
Usable PIR
In [22] we showed that existing single-server computational private information retrieval (PIR) protocols for the purpose of preserving client access patterns leakage are orders o...
Peter Williams, Radu Sion
111
Voted
CCS
2004
ACM
15 years 7 months ago
Payload attribution via hierarchical bloom filters
Payload attribution is an important problem often encountered in network forensics. Given an excerpt of a payload, finding its source and destination is useful for many security ...
Kulesh Shanmugasundaram, Hervé Brönnim...
SAINT
2003
IEEE
15 years 7 months ago
A Generalized Target-Driven Cache Replacement Policy for Mobile Environments
Caching frequently accessed data items on the client side is an effective technique to improve the system performance in wireless networks. Due to cache size limitations, cache re...
Liangzhong Yin, Guohong Cao, Ying Cai
139
Voted
ESORICS
2009
Springer
15 years 6 months ago
An Effective Method for Combating Malicious Scripts Clickbots
Abstract. Online advertising has been suffering serious click fraud problem. Fraudulent publishers can generate false clicks using malicious scripts embedded in their web pages. Ev...
Yanlin Peng, Linfeng Zhang, J. Morris Chang, Yong ...
103
Voted
BMCBI
2008
165views more  BMCBI 2008»
15 years 2 months ago
SWS: accessing SRS sites contents through Web Services
Background: Web Services and Workflow Management Systems can support creation and deployment of network systems, able to automate data analysis and retrieval processes in biomedic...
Paolo Romano 0001, Domenico Marra