Sciweavers

103 search results - page 19 / 21
» Visible or invisible links
Sort
View
CEAS
2007
Springer
14 years 18 days ago
Blog Spam: A Review
Blogs are becoming an increasingly popular target for spammers. The existence of multiple vectors for spam injection, the potential of reaching many eyeballs with a single spam, a...
Adam Thomason
HOTOS
2009
IEEE
14 years 14 days ago
Operating Systems Should Provide Transactions
Operating systems can efficiently provide system transactions to user applications, in which user-level processes can execute a series of system calls atomically and in isolation ...
Donald E. Porter, Emmett Witchel
CONEXT
2009
ACM
13 years 9 months ago
Where the sidewalk ends: extending the internet as graph using traceroutes from P2P users
An accurate Internet topology graph is important in many areas of networking, from deciding ISP business relationships to diagnosing network anomalies. Most Internet mapping effor...
Kai Chen, David R. Choffnes, Rahul Potharaju, Yan ...
IMC
2010
ACM
13 years 6 months ago
Understanding latent interactions in online social networks
Popular online social networks (OSNs) like Facebook and Twitter are changing the way users communicate and interact with the Internet. A deep understanding of user interactions in...
Jing Jiang, Christo Wilson, Xiao Wang, Peng Huang,...
FC
2009
Springer
104views Cryptology» more  FC 2009»
14 years 3 months ago
Mitigating Inadvertent Insider Threats with Incentives
Inadvertent insiders are trusted insiders who do not have malicious intent (as with malicious insiders) but do not responsibly managing security. The result is often enabling a mal...
Debin Liu, XiaoFeng Wang, L. Jean Camp