Sciweavers

1367 search results - page 252 / 274
» Social Network Model Based on Keyword Categorization
Sort
View
USENIX
2008
13 years 11 months ago
Spectator: Detection and Containment of JavaScript Worms
Recent popularity of interactive AJAX-based Web 2.0 applications has given rise to a new breed of security threats: JavaScript worms. In this paper we propose Spectator, the first...
V. Benjamin Livshits, Weidong Cui
ASIACRYPT
2010
Springer
13 years 6 months ago
Structured Encryption and Controlled Disclosure
We consider the problem of encrypting structured data (e.g., a web graph or a social network) in such a way that it can be efficiently and privately queried. For this purpose, we ...
Melissa Chase, Seny Kamara
LCN
2006
IEEE
14 years 2 months ago
Performance Limits and Analysis of Contention-based IEEE 802.11 MAC
— Recent advance in IEEE 802.11 based standard has pushed the wireless bandwidth up to 600Mbps while keeping the same wireless medium access control (MAC) schemes for full backwa...
Shao-Cheng Wang, Ahmed Helmy
IMC
2007
ACM
13 years 10 months ago
I tube, you tube, everybody tubes: analyzing the world's largest user generated content video system
User Generated Content (UGC) is re-shaping the way people watch video and TV, with millions of video producers and consumers. In particular, UGC sites are creating new viewing pat...
Meeyoung Cha, Haewoon Kwak, Pablo Rodriguez, Yong-...
IJCNN
2006
IEEE
14 years 2 months ago
Biologically Inspired KFLANN Place Fields for Robot Localization
– This paper presents a hippocampal inspired robot localization model that provides a means for a simple robotic platform with ultrasonic sensors to localize itself. There have b...
Alex Leng Phuan Tay