enter search term and/or author name
Fighting the spam wars: A remailer approach with restrictive aliasing
Pawel Gburzynski, Jacek Maitan
We present an effective method of eliminating unsolicited electronic mail (so-called spam) and discuss its publicly accessible prototype implementation. A subscriber to our system is able to obtain an unlimited number of aliases of his/her...
Optimizing result prefetching in web search engines with segmented indices
Ronny Lempel, Shlomo Moran
We study the process in which search engines with segmented indices serve queries. In particular, we investigate the number of result pages that search engines should prepare during the query processing phase.Search engine users have been observed to...
Fine-grained control of security capabilities
Dan Boneh, Xuhua Ding, Gene Tsudik
We present a new approach for fine-grained control over users' security privileges (fast revocation of credentials) centered around the concept of an on-line semi-trusted mediator (SEM). The use of a SEM in conjunction with a simple threshold variant...
An open architecture for next-generation telecommunication services
Gregory W. Bond, Eric Cheung, K. Hal Purdy, Pamela Zave, J. Christopher Ramming
An open (in the sense of extensible and programmable) architecture for IP telecommunications must be based on a comprehensive strategy for managing feature interaction. We describe our experience with BoxOS, an IP telecommunication platform that...