Sciweavers

1917 search results - page 293 / 384
» User Model and Utility Based Power Management
Sort
View
ER
2001
Springer
131views Database» more  ER 2001»
14 years 1 months ago
Seamless Personalization of E-commerce Applications
In this paper we present an original approach for personalizing complex Web applications, in particular e-commerce applications. This approach is based on a clear separation of con...
Juan Cappi, Gustavo Rossi, Andres Fortier, Daniel ...
IH
2001
Springer
14 years 1 months ago
Real World Patterns of Failure in Anonymity Systems
Abstract. We present attacks on the anonymity and pseudonymity provided by a “lonely hearts” dating service and by the HushMail encrypted email system. We move on to discuss so...
Richard Clayton, George Danezis, Markus G. Kuhn
GECCO
2008
Springer
229views Optimization» more  GECCO 2008»
13 years 10 months ago
EIN-WUM: an AIS-based algorithm for web usage mining
With the ever expanding Web and the information published on it, effective tools for managing such data and presenting information to users based on their needs are becoming nece...
Adel Torkaman Rahmani, B. Hoda Helmi
CN
2004
140views more  CN 2004»
13 years 9 months ago
Mobile hop-by-hop multicast routing
This work focuses on mobility management in a multicast environment. Traditional solutions, based either on bi-directional tunneling or on remote subscription, have different draw...
Rolland Vida, Luís Henrique Maciel Kosmalsk...
USENIX
2004
13 years 10 months ago
REX: Secure, Extensible Remote Execution
The ubiquitous SSH package has demonstrated the importance of secure remote login and execution. As remote execution tools grow in popularity, users require new features and exten...
Michael Kaminsky, Eric Peterson, Daniel B. Giffin,...