Cloaking

Results: 102



#Item
31Content delivery network / Internet / Cloud computing / Computing / Akamai Technologies

AKAMAI CLOUD SECURITY SOLUTIONS: PRODUCT BRIEF Site Shield Defends the origin by cloaking web infrastructure and reducing vulnerability Everyone connected to an enterprise – customers, employees and partners – expe

Add to Reading List

Source URL: www.akamai.co.kr

Language: English - Date: 2014-07-18 11:30:01
32Satellite navigation systems / GPS / Geolocation / Road transport / Crime prevention / Global Positioning System / Privacy / Mobile phone tracking / Internet privacy / Technology / Transport / Navigation

Preserving Privacy in GPS Traces via Uncertainty-Aware Path Cloaking Baik Hoh, Marco Gruteser Hui Xiong

Add to Reading List

Source URL: www.winlab.rutgers.edu

Language: English - Date: 2007-08-20 15:05:38
33Internet marketing / Internet search engines / Cloaking / Spamming / Google Search / Web search engine / Meta element / Search engine marketing / Internet / Search engine optimization / Computing

8 User Experience Design and Search Engine Optimization User Experience Design’s Fundamental

Add to Reading List

Source URL: projectuxd.com

Language: English - Date: 2012-04-19 20:29:09
34Content delivery network / Internet / Cloud computing / Computing / Akamai Technologies

AKAMAI CLOUD SECURITY SOLUTIONS: PRODUCT BRIEF Site Shield Defends the origin by cloaking web infrastructure and reducing vulnerability Everyone connected to an enterprise – customers, employees and partners – expe

Add to Reading List

Source URL: www.akamai.fr

Language: English - Date: 2014-07-18 11:30:01
35Internet marketing / Electronic commerce / Spamming / Cloaking / Duplicate content / Spam / Keyword stuffing / Internet / Computing / Search engine optimization

130604_Periodic Table_CS5_large

Add to Reading List

Source URL: imajayne.com.au

Language: English - Date: 2015-03-15 07:38:44
36Cloud applications / Cross-platform software / Web 2.0 / Online spreadsheets / Webmail / Web application / Google Docs / Gmail / Password / Computing / Software / Cloud computing

Content Cloaking: Preserving Privacy with Google Docs and other Web Applications Gabriele D’Angelo Fabio Vitali

Add to Reading List

Source URL: upsilon.cc

Language: English - Date: 2015-01-01 06:26:54
37Data types / Type theory / JavaScript / Computer security / Malware / Client honeypot / Internet Explorer 9 / C / Type system / Computing / Software / Cross-platform software

Rozzle: De-Cloaking Internet Malware Clemens Kolbitsch Benjamin Livshits and Benjamin Zorn Christian Seifert

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2012-03-06 19:36:00
38World Wide Web / Internet search engines / Web analytics / Spamming / Search engine optimization / Cloaking / Doorway page / Spamdexing / Bing / Internet / Computing / Internet marketing

Search + Seizure: The Effectiveness of Interventions on SEO Campaigns † David Y. Wang Matthew Der Mohammad Karami Lawrence Saul Damon McCoy† Stefan Savage Geoffrey M. Voelker

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2014-09-17 17:39:46
39Metamaterials / Condensed matter physics / Optics / Nanowire / Photonic metamaterial / Superlens / Permittivity / Plasmonic Nanoparticles / Surface plasmon / Physics / Electromagnetism / Nanomaterials

Cloaking and enhanced scattering of core-shell plasmonic nanowires Ali Mirzaei,∗ Ilya V. Shadrivov, Andrey E. Miroshnichenko, and Yuri S. Kivshar Nonlinear Physics Center and Center for Ultra-high bandwidth Devices for

Add to Reading List

Source URL: wwwrsphysse.anu.edu.au

Language: English - Date: 2013-09-13 04:52:47
40Nanomaterials / Optics / Theoretical physics / Metamaterial cloaking / Metamaterial / Cloaking device / Transformation optics / Invisibility / Microwave / Physics / Metamaterials / Electromagnetism

BoxTeer Engineering Building Durham, NCNon-profit Org. US Postage

Add to Reading List

Source URL: www.pratt.duke.edu

Language: English - Date: 2012-09-19 15:34:15
UPDATE