Sciweavers

348 search results - page 62 / 70
» A Recovery Mechanism for Shells
Sort
View
110
Voted
HICSS
2003
IEEE
143views Biometrics» more  HICSS 2003»
15 years 5 months ago
Formation, Routing, and Maintenance Protocols for the BlueRing Scatternet of Bluetooths
The basic networking unit in Bluetooth is piconet, and a larger-area Bluetooth network can be formed by multiple piconets, called scatternet. However, the structure of scatternets...
Ting-Yu Lin, Yu-Chee Tseng, Keng-Ming Chang, Chun-...
103
Voted
INFOCOM
2003
IEEE
15 years 5 months ago
Load Balancing and Stability Issues in Algorithms for Service Composition
— Service composition enables flexible creation of new services by assembling independent service components. We are focused on the scenario where such composition takes place a...
Bhaskaran Raman, Randy H. Katz
101
Voted
SIGGRAPH
2000
ACM
15 years 4 months ago
Time-dependent visual adaptation for fast realistic image display
Human vision takes time to adapt to large changes in scene intensity, and these transient adjustments have a profound effect on visual appearance. This paper offers a new operator...
Sumanta N. Pattanaik, Jack Tumblin, Yangli Hector ...
CCS
2006
ACM
15 years 4 months ago
Doppelganger: Better browser privacy without the bother
We introduce Doppelganger, a novel system for creating and enforcing fine-grained, privacy preserving browser cookie policies with low manual effort. Browser cookies pose privacy ...
Umesh Shankar, Chris Karlof
COMCOM
2007
95views more  COMCOM 2007»
15 years 12 days ago
Key management for long-lived sensor networks in hostile environments
Large-scale wireless sensor networks (WSNs) are highly vulnerable to attacks because they consist of numerous resource-constrained devices and communicate via wireless links. Thes...
Michael Chorzempa, Jung Min Park, Mohamed Eltoweis...