Sciweavers

36 search results - page 4 / 8
» Spam Over Internet Telephony and How to Deal with it
Sort
View
CISC
2005
Springer
109views Cryptology» more  CISC 2005»
14 years 1 months ago
Enforcing Email Addresses Privacy Using Tokens
We propose a system which allows users to monitor how their email addresses are used and how they spread over the Internet. This protects the privacy of the user and can reduce the...
Roman Schlegel, Serge Vaudenay
MIR
2003
ACM
213views Multimedia» more  MIR 2003»
14 years 24 days ago
Replication algorithms to retrieve scalable streaming media over Content Delivery Networks
CDN (Content Delivery Networks) improves end-user performance by replicating web contents on a group of geographically distributed content servers. Replication Algorithm plays an ...
Zhou Su, Jiro Katto, Yasuhiko Yasuda
WWW
2009
ACM
14 years 8 months ago
Answering approximate queries over autonomous web databases
To deal with the problem of empty or too little answers returned from a Web database in response to a user query, this paper proposes a novel approach to provide relevant and rank...
Xiangfu Meng, Z. M. Ma, Li Yan
CACM
2006
102views more  CACM 2006»
13 years 7 months ago
Infoglut
whose titles and abstracts sound very interesting, the pile of unread reports continues to grow on the table in my office." (How quaint the terminology: mail and electronic me...
Peter J. Denning
WISE
2000
Springer
13 years 12 months ago
Modelling the Webspace of an Intranet
Searching the internet using the currently available searchengines is not satisfactory. Thetechniquesused there focus on the extraction of relevant informationdirectlyfrom the doc...
Roelof van Zwol, Peter M. G. Apers