Sciweavers

1661 search results - page 332 / 333
» Distributed Top-K Monitoring
Sort
View
ACSAC
2010
IEEE
12 years 9 months ago
A quantitative analysis of the insecurity of embedded network devices: results of a wide-area scan
We present a quantitative lower bound on the number of vulnerable embedded device on a global scale. Over the past year, we have systematically scanned large portions of the inter...
Ang Cui, Salvatore J. Stolfo
CHI
2011
ACM
12 years 9 months ago
PhotoCity: training experts at large-scale image acquisition through a competitive game
Large-scale, ground-level urban imagery has recently developed as an important element of online mapping tools such as Google’s Street View. Such imagery is extremely valuable i...
Kathleen Tuite, Noah Snavely, Dun-yu Hsiao, Nadine...
JCDL
2011
ACM
301views Education» more  JCDL 2011»
12 years 8 months ago
Archiving the web using page changes patterns: a case study
A pattern is a model or a template used to summarize and describe the behavior (or the trend) of a data having generally some recurrent events. Patterns have received a considerab...
Myriam Ben Saad, Stéphane Gançarski
SODA
2012
ACM
245views Algorithms» more  SODA 2012»
11 years 8 months ago
Lower bounds for number-in-hand multiparty communication complexity, made easy
In this paper we prove lower bounds on randomized multiparty communication complexity, both in the blackboard model (where each message is written on a blackboard for all players ...
Jeff M. Phillips, Elad Verbin, Qin Zhang
SIGUCCS
2003
ACM
13 years 10 months ago
WebDAV: what it is, what it does, why you need it
Legacy network file services such as NFS, SMB/CIFS, and AFP changed the way we worked. File services running on crossplatform networks allowed us to save our files on remote syste...
Luis O. Hernández, Mahmoud Pegah