Sciweavers

2270 search results - page 342 / 454
» The Quality of Knowledge: Knowledge Patterns and Knowledge R...
Sort
View
ACC
2011
65views more  ACC 2011»
12 years 9 months ago
Measuring the Deployment Hiccups of DNSSEC
On May 5, 2010 the last step of the DNSSEC deployment on the 13 root servers was completed. DNSSEC is a set of security extensions on the traditional DNS protocol, that aim in prev...
Vasilis Pappas, Angelos D. Keromytis
ASUNAM
2011
IEEE
12 years 9 months ago
SCENE: Structural Conversation Evolution NEtwork
—It’s not just what you say, but it is how you say it. To date, the majority of the Instant Message (IM) analysis and research has focused on the content of the conversation.Th...
Marina Danilevsky, Joshua M. Hailpern, Jiawei Han
COMPSAC
2011
IEEE
12 years 9 months ago
Dynamic Request Management Algorithms for Web-Based Services in Cloud Computing
—Providers of Web-based services can take advantage of many convenient features of cloud computing infrastructures, but they still have to implement request management algorithms...
Riccardo Lancellotti, Mauro Andreolini, Claudia Ca...
IACR
2011
127views more  IACR 2011»
12 years 9 months ago
Oblivious RAM with O((log N)^3) Worst-Case Cost
Oblivious RAM (O-RAM) is a useful primitive that allows a client to hide its data access patterns from an untrusted server in storage outsourcing applications. This paper proposes...
Elaine Shi, T.-H. Hubert Chan, Emil Stefanov, Ming...
CVPR
2001
IEEE
14 years 11 months ago
Event-Based Analysis of Video
Dynamic events can be regarded as long-term temporal objects, which are characterized by spatio-temporal features at multiple temporal scales. Based on this, we design a simple st...
Lihi Zelnik-Manor, Michal Irani