Sciweavers

1977 search results - page 360 / 396
» internet 2008
Sort
View
CORR
2008
Springer
140views Education» more  CORR 2008»
15 years 3 months ago
Steganography of VoIP streams
The paper concerns available steganographic techniques that can be used for creating covert channels for VoIP (Voice over Internet Protocol) streams. Apart from characterizing exis...
Wojciech Mazurczyk, Krzysztof Szczypiorski
FGCS
2008
95views more  FGCS 2008»
15 years 2 months ago
SemreX: Efficient search in a semantic overlay for literature retrieval
The World Wide Web is growing at such a pace that even the biggest centralized search engines are able to index only a small part of the available documents on the Internet. The d...
Hai Jin, Hanhua Chen
189
Voted
ACMSE
2008
ACM
15 years 6 months ago
Gnutella: integrating performance and security in fully decentralized P2P models
Peer-To-Peer (P2P) systems have made an enormous impact on the Internet, directly affecting its performance and security. The litigation against P2P file sharing has led some desi...
Rossana Motta, Wickus Nienaber, Jon Jenkins
167
Voted
MOBISYS
2008
ACM
16 years 4 months ago
Micro-Blog: sharing and querying content through mobile phones and social participation
Recent years have witnessed the impacts of distributed content sharing (Wikipedia, Blogger), social networks (Facebook, MySpace), sensor networks, and pervasive computing. We beli...
Al Schmidt, Jack Li, Landon P. Cox, Romit Roy Chou...
CASCON
2008
124views Education» more  CASCON 2008»
15 years 5 months ago
Synchronized tag clouds for exploring semi-structured clinical trial data
Searching and comparing information from semi-structured repositories is an important, but cognitively complex activity for internet users. The typical web interface displays a li...
Maria-Elena Hernandez, Sean M. Falconer, Margaret-...