Sciweavers

277 search results - page 47 / 56
» Secure Aggregation in Large Scale Overlay Networks
Sort
View
ICAC
2006
IEEE
14 years 2 months ago
Autonomic Live Adaptation of Virtual Computational Environments in a Multi-Domain Infrastructure
A shared distributed infrastructure is formed by federating computation resources from multiple domains. Such shared infrastructures are increasing in popularity and are providing...
Paul Ruth, Junghwan Rhee, Dongyan Xu, Rick Kennell...
GCC
2004
Springer
14 years 1 months ago
XML Based X.509 Authorization in CERNET Grid
: This paper presents an authorization solution for resource management and control developing as a part of the China Education and Research Network (CERNET) to perform fine-graine...
Wu Liu, Jianping Wu, Hai-Xin Duan, Xing Li, Ping R...
NSDI
2008
13 years 10 months ago
Exploiting Machine Learning to Subvert Your Spam Filter
Using statistical machine learning for making security decisions introduces new vulnerabilities in large scale systems. This paper shows how an adversary can exploit statistical m...
Blaine Nelson, Marco Barreno, Fuching Jack Chi, An...
EKAW
2010
Springer
13 years 7 months ago
Representing, Proving and Sharing Trustworthiness of Web Resources Using Veracity
The World Wide Web has evolved into a distributed network of web applications facilitating the publication of information on a large scale. Judging whether such information can be ...
Grégoire Burel, Amparo Elizabeth Cano, Matt...
IMC
2009
ACM
14 years 2 months ago
Scalable proximity estimation and link prediction in online social networks
Proximity measures quantify the closeness or similarity between nodes in a social network and form the basis of a range of applications in social sciences, business, information t...
Han Hee Song, Tae Won Cho, Vacha Dave, Yin Zhang, ...