Sciweavers

162 search results - page 8 / 33
» Securing Email Archives through User Modeling
Sort
View
IH
2001
Springer
13 years 12 months ago
Real World Patterns of Failure in Anonymity Systems
Abstract. We present attacks on the anonymity and pseudonymity provided by a “lonely hearts” dating service and by the HushMail encrypted email system. We move on to discuss so...
Richard Clayton, George Danezis, Markus G. Kuhn
ICASSP
2011
IEEE
12 years 11 months ago
Bayesian topic models for describing computer network behaviors
We consider the use of Bayesian topic models in the analysis of computer network traffic. Our approach utilizes latent Dirichlet allocation and time-varying dynamic latent Dirich...
Christopher Cramer, Lawrence Carin
IEEEARES
2008
IEEE
14 years 1 months ago
Trust Modelling in E-Commerce through Fuzzy Cognitive Maps
Trust and its role in e-commerce is a major topic for researchers, clients, and service providers alike. However, questions of origin and practical usage of trust in e-commerce ar...
Christian Schläger, Günther Pernul
WMASH
2004
ACM
14 years 26 days ago
Reputation-based Wi-Fi deployment protocols and security analysis
In recent years, wireless Internet service providers (WISPs) have established thousands of WiFi hot spots in cafes, hotels and airports in order to offer to travelling Internet u...
Naouel Ben Salem, Jean-Pierre Hubaux, Markus Jakob...
ASWC
2008
Springer
13 years 9 months ago
Semantic Assistants - User-Centric Natural Language Processing Services for Desktop Clients
Today's knowledge workers have to spend a large amount of time and manual effort on creating, analyzing, and modifying textual content. While more advanced semantically-orient...
René Witte, Thomas Gitzinger