CS Communication

Results: 1405



#Item
851Spamming / Computer-mediated communication / Anti-spam techniques / N-gram / Spam / Speech act / Email / Internet / Computing

Improving “Email Speech Acts” Analysis via N-gram Selection Vitor R. Carvalho Language Technologies Institute Carnegie Mellon University 5000 Forbes Avenue, Pittsburgh PA

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2006-07-05 12:47:54
852Inter-process communication / Java remote method invocation / Remote procedure call / Java / Common Object Request Broker Architecture / Stub / Web service / Component Object Model / Server-side / Computing / Concurrent computing / Software engineering

Remote Batch Invocation for Compositional Object Services Ali Ibrahim2, Yang Jiao1 , Eli Tilevich1 , and William R. Cook2 1 2

Add to Reading List

Source URL: www.cs.utexas.edu

Language: English - Date: 2015-02-24 15:46:50
853Computing / Anti-spam techniques / Message transfer agent / Spam / Email tracking / Email authentication / Email / Computer-mediated communication / Internet

Preventing Information Leaks in Email Vitor R. Carvalho Language Technologies Institute Carnegie Mellon University Abstract The widespread use of email has raised serious privacy concerns.

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2007-01-30 15:41:35
854Internet / Internet Message Access Protocol / Bloom filter / Email / Computing / Computer-mediated communication

SSARES: Secure Searchable Automated Remote Email Storage∗† Adam J. Aviv Department of Computer and Information Science University of Pennsylvania [removed]

Add to Reading List

Source URL: www1.cs.columbia.edu

Language: English - Date: 2007-09-27 19:27:15
855Grammar / Human communication / Question / ALGOL 68 / Software engineering / Pongamia / Potato / Food and drink / Programming language theory / Data collection

SAMPLE QUESTIONS BASED ON REVISED PATTERN OF CS(P) EXAMINATION EFFECTIVE FROM 2011 The syllabus and pattern of Civil Services (Preliminary) Examination (CS(P)) has undergone significant changes with effect from[removed]The

Add to Reading List

Source URL: upsc.gov.in

Language: English - Date: 2010-12-09 00:44:25
856Symbiosis / Multi-agent systems / Pheromone / Zoology / Honey bee pheromones / Swarm intelligence / Swarm behaviour / Ant colony optimization algorithms / Biology / Ant / Hymenoptera

The Tenth International Symposium on Artificial Life and Robotics 2005(AROB 10th ’05), B-con Plaza, Beppu, Oita, Japan, February 4-6, 2005 Effectiveness of Emerged Pheromone Communication in an Ant Foraging Model Yosh

Add to Reading List

Source URL: www2.alife.cs.is.nagoya-u.ac.jp

Language: English - Date: 2005-03-16 03:57:45
857Technical communication / Hypermedia / World Wide Web / Web page / XSLT / XML / Personalization / Representational state transfer / HTML / Computing / Hypertext / Markup languages

The Art of Multi-channel Hypermedia Application Development Dionysios G. Synodinos1, and Paris Avgeriou2 (Proceedings of MobEA WS, collocated with WWW2003 conference, Budapest, Hungary, May 20th[removed]Abstract— The pl

Add to Reading List

Source URL: www.cs.rug.nl

Language: English - Date: 2010-12-10 07:18:55
858Markov processes / Fault-tolerant computer systems / Inter-process communication / Process management / Phase transition

Synchronization in Distributed Programs FRED B. SCHNEIDER Cornell University A technique for solving synchronization problems in distributed programs is described. Use of this technique in environments in which processes

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2001-11-26 10:32:44
859National security / Computer network security / Secure communication / Security policy / Reference monitor / Trusted computing base / Kernel / Protection mechanism / Vulnerability / Computer security / Security / Crime prevention

A Language-Based Approach to Security Fred B. Schneider1 , Greg Morrisett1 , and Robert Harper2 2 1 Cornell University, Ithaca, NY

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2013-09-13 15:41:39
860Paillier cryptosystem / Ciphertext indistinguishability / Threshold cryptosystem / Homomorphic encryption / Private information retrieval / Secure Shell / Cryptography / Public-key cryptography / Cryptographic protocols

Private Keyword-Based Push and Pull with Applications to Anonymous Communication (Extended Abstract) Lea Kissner1 , Alina Oprea1 , Michael K. Reiter12 , Dawn Song12 , and Ke Yang1 1

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2004-05-22 23:40:41
UPDATE