Sciweavers

1276 search results - page 214 / 256
» Vetting the links of the web
Sort
View
SIGIR
2009
ACM
14 years 4 months ago
Counting ancestors to estimate authority
The AncestorRank algorithm calculates an authority score by using just one characteristic of the web graph—the number of ancestors per node. For scalability, we estimate the num...
Jian Wang, Brian D. Davison
WOWMOM
2009
ACM
151views Multimedia» more  WOWMOM 2009»
14 years 4 months ago
Distributed user authentication in wireless LANs
—An increasing number of mobile devices, including smartphones, use WLAN for accessing the Internet. Existing WLAN authentication mechanisms are either disruptive, such as presen...
Dmitriy Kuptsov, Andrey Khurri, Andrei Gurtov
COLCOM
2008
IEEE
14 years 4 months ago
Collaborative Search and User Privacy: How Can They Be Reconciled?
Abstract. Collaborative search engines (CSE) let users pool their resources and share their experiences when seeking information on the web. However, when shared, search terms and ...
Thorben Burghardt, Erik Buchmann, Klemens Böh...
ESCIENCE
2007
IEEE
14 years 4 months ago
Building a Data Grid for the Australian Nanostructural Analysis Network
: This paper describes the architecture and services developed by the GRANI project for the Australian Nanostructural Analysis Network Organization (NANO). The aim of GRANI was to ...
Brendan Mauger, Jane Hunter, John Drennan, Ashley ...
HICSS
2007
IEEE
164views Biometrics» more  HICSS 2007»
14 years 4 months ago
The Social Structure of Tagging Internet Video on del.icio.us
Abstract— The ability to tag resources with uncontrolled metadata or “folksonomies” is often characterized as one of the central features of “Web 2.0” applications. Folks...
John C. Paolillo, Shashikant Penumarthy