Sciweavers

140 search results - page 17 / 28
» ivs 2008
Sort
View
AIRWEB
2008
Springer
13 years 12 months ago
Query-log mining for detecting spam
Every day millions of users search for information on the web via search engines, and provide implicit feedback to the results shown for their queries by clicking or not onto them...
Carlos Castillo, Claudio Corsi, Debora Donato, Pao...
ASIACRYPT
2008
Springer
13 years 11 months ago
A New Attack on the LEX Stream Cipher
Abstract. In [6], Biryukov presented a new methodology of stream cipher design, called leak extraction. The stream cipher LEX, based on this methodology and on the AES block cipher...
Orr Dunkelman, Nathan Keller
CORR
2008
Springer
127views Education» more  CORR 2008»
13 years 9 months ago
Universe Detectors for Sybil Defense in Ad Hoc Wireless Networks
The Sybil attack in unknown port networks such as wireless is not considered tractable. A wireless node is not capable of independently differentiating the universe of real nodes f...
Adnan Vora, Mikhail Nesterenko, Sébastien T...
IV
2008
IEEE
296views Visualization» more  IV 2008»
14 years 4 months ago
Revealing Subnetwork Roles using Contextual Visualization: Comparison of Metabolic Networks
This article is addressing a recurrent problem in biology: mining newly built large scale networks. Our approach consists in comparing these new networks to well known ones. The v...
Romain Bourqui, Fabien Jourdan
JITECH
2008
57views more  JITECH 2008»
13 years 9 months ago
Offshore middlemen: transnational intermediation in technology sourcing
The tendency of acquiring information systems and other high technology services from international suppliers continues at unprecedented levels. The primary motivation for the off...
Volker Mahnke, Jonathan Wareham, Niels Bjør...