Sciweavers

2469 search results - page 381 / 494
» Self-Protection of Web Content
Sort
View
MKM
2004
Springer
14 years 2 months ago
A Graph-Based Approach Towards Discerning Inherent Structures in a Digital Library of Formal Mathematics
As the amount of online formal mathematical content grows, for example through active efforts such as the Mathweb [21], MOWGLI [4], Formal Digital Library, or FDL [1], and others, ...
Lori Lorigo, Jon M. Kleinberg, Richard Eaton, Robe...
SIGCOMM
2003
ACM
14 years 2 months ago
A high-level programming environment for packet trace anonymization and transformation
Packet traces of operational Internet traffic are invaluable to network research, but public sharing of such traces is severely limited by the need to first remove all sensitive...
Ruoming Pang, Vern Paxson
IPTPS
2003
Springer
14 years 2 months ago
Sloppy Hashing and Self-Organizing Clusters
We are building Coral, a peer-to-peer content distribution system. Coral creates self-organizing clusters of nodes that fetch information from each other to avoid communicating wi...
Michael J. Freedman, David Mazières
HICSS
2002
IEEE
169views Biometrics» more  HICSS 2002»
14 years 2 months ago
Enabling Technology for Personalizing Mobile Services
A major trend in the current information society is personalization, which is considered a key business enabler for mobile services because the mobile device is a personal assista...
Marc M. Lankhorst, Herma Van Kranenburg, Alfons H....
IDEAS
2002
IEEE
125views Database» more  IDEAS 2002»
14 years 2 months ago
Integrating HTML Tables Using Semantic Hierarchies And Meta-Data Sets
As the Internet is a global network, there is a demand on accessing closely related data without browsing through di erent Web documents. A signi cant amount of these data are pre...
Seung Jin Lim, Yiu-Kai Ng, Xiaochun Yang