Sciweavers

759 search results - page 43 / 152
» What Can Be Implemented Anonymously
Sort
View
CEAS
2008
Springer
13 years 12 months ago
Improving Email Trustworthiness through Social-Group Key Authentication
The increasing use of email for phishing and unsolicited marketing has reduced the trustworthiness of email as a communication medium. Sender authentication is a known defense aga...
Vivek Pathak, Liviu Iftode, Danfeng Yao
CCS
2011
ACM
12 years 10 months ago
Cirripede: circumvention infrastructure using router redirection with plausible deniability
Many users face surveillance of their Internet communications and a significant fraction suffer from outright blocking of certain destinations. Anonymous communication systems a...
Amir Houmansadr, Giang T. K. Nguyen, Matthew Caesa...
NAACL
1994
13 years 11 months ago
The Penn Treebank: Annotating Predicate Argument Structure
The Penn Treebank has recently implemented a new syntactic annotation scheme, designed to highlight aspects of predicate-argument structure. This paper discusses the implementatio...
Mitchell P. Marcus, Grace Kim, Mary Ann Marcinkiew...
PDCAT
2009
Springer
14 years 4 months ago
Balanced Dense Polynomial Multiplication on Multi-Cores
Abstract— In symbolic computation, polynomial multiplication is a fundamental operation akin to matrix multiplication in numerical computation. We present efficient implementati...
Marc Moreno Maza, Yuzhen Xie
ICCCN
2007
IEEE
14 years 4 months ago
Design of a Network Service Architecture
— Considerable research efforts in the networking community are focused on defining a new Internet architecture that not only solves some of the problems of the current design, ...
Sivakumar Ganapathy, Tilman Wolf