Sciweavers

155 search results - page 19 / 31
» A Trace Model for Pointers and Objects
Sort
View
ICIP
2007
IEEE
15 years 11 months ago
Multi-User Collusion Behavior Forensics: Game Theoretic Formulation of Fairness Dynamics
Multi-user collusion is an cost-effective attack against digital fingerprinting, in which a group of attackers collectively undermine the traitor tracing capability of digital fin...
Wan-Yi Sabrina Lin, H. Vicky Zhao, K. J. Ray Liu
89
Voted
MOBIHOC
2008
ACM
15 years 9 months ago
Routing in a cyclic mobispace
A key challenge of routing in delay tolerant networks (DTNs) is to find routes that have high delivery rates and low endto-end delays. When oracles are not available for future co...
Cong Liu, Jie Wu
ICPADS
2008
IEEE
15 years 4 months ago
Textures in Second Life: Measurement and Analysis
We collected packet traces from Second Life client sessions and analyzed the packet contents. We observed that textures constitute a majority of the network traffic. We further c...
Huiguang Liang, Mehul Motani, Wei Tsang Ooi
HOPL
2007
15 years 1 months ago
AppleScript
AppleScript is a scripting language and environment for the Mac OS. Originally conceived in 1989, AppleScript allows end-users to automate complex tasks and customize Mac OS appli...
William R. Cook
SIGCOMM
2006
ACM
15 years 3 months ago
Quantifying Skype user satisfaction
The success of Skype has inspired a generation of peer-topeer-based solutions for satisfactory real-time multimedia services over the Internet. However, fundamental questions, suc...
Kuan-Ta Chen, Chun-Ying Huang, Polly Huang, Chin-L...