Sciweavers

9 search results - page 2 / 2
» Human Behavior and Challenges of Anonymizing WLAN Traces
Sort
View
MOBISYS
2007
ACM
14 years 4 months ago
SmokeScreen: flexible privacy controls for presence-sharing
Presence-sharing is an emerging platform for mobile applications, but presence-privacy remains a challenge. Privacy controls must be flexible enough to allow sharing between both ...
Landon P. Cox, Angela Dalton, Varun Marupadi
CHI
2005
ACM
14 years 5 months ago
Profile before optimizing: a cognitive metrics approach to workload analysis
The Intelligence Analyst (IA) community will soon be the designated users of many new software tools. In the multitasking world of the IA, any one tool cannot be permitted to gree...
Wayne D. Gray, Michael J. Schoelles, Christopher W...
IJAMC
2010
134views more  IJAMC 2010»
13 years 3 months ago
HyperVerse: simulation and testbed reconciled
—When dealing with dynamic large-scale topologies such as those underlying peer-to-peer (P2P) distributed virtual environments (DVE), one inescapably reaches the point where eith...
Jean Botev, Markus Esch, Hermann Schloss, Ingo Sch...
ASPLOS
2006
ACM
13 years 11 months ago
Temporal search: detecting hidden malware timebombs with virtual machines
Worms, viruses, and other malware can be ticking bombs counting down to a specific time, when they might, for example, delete files or download new instructions from a public we...
Jedidiah R. Crandall, Gary Wassermann, Daniela A. ...