Sciweavers

1422 search results - page 124 / 285
» A Framework for Understanding Botnets
Sort
View
134
Voted
PERVASIVE
2007
Springer
15 years 10 months ago
Virtual Walls: Protecting Digital Privacy in Pervasive Environments
As pervasive environments become more commonplace, the privacy of users is placed at increased risk. The numerous and diverse sensors in these environments can record users’ cont...
Apu Kapadia, Tristan Henderson, Jeffrey J. Fieldin...
HICSS
2006
IEEE
146views Biometrics» more  HICSS 2006»
15 years 10 months ago
A Taxonomy for RFID
—Ben Clacy and Brian Jennings presented their recently published paper with the title of “service management: driving the future of IT” [1], which highlighted service oriente...
Taimur Hassan, Samir Chatterjee
VL
2006
IEEE
106views Visual Languages» more  VL 2006»
15 years 10 months ago
Relo: Helping Users Manage Context during Interactive Exploratory Visualization of Large Codebases
As software systems grow in size and use more third-party libraries and frameworks, the need for developers to understand unfamiliar large codebases is rapidly increasing. In this...
Vineet Sinha, David R. Karger, Rob Miller
INFOSCALE
2006
ACM
15 years 10 months ago
Simulating non-scanning worms on peer-to-peer networks
Millions of Internet users are using large-scale peerto-peer (P2P) networks to share content files today. Many other mission-critical applications, such as Internet telephony and...
Guanling Chen, Robert S. Gray
133
Voted
ISPASS
2005
IEEE
15 years 9 months ago
Analysis of Network Processing Workloads
Abstract— Network processing is becoming an increasingly important paradigm as the Internet moves towards an architecture with more complex functionality inside the network. Mode...
Ramaswamy Ramaswamy, Ning Weng, Tilman Wolf