Sciweavers

152 search results - page 22 / 31
» Anonymous k -Show Credentials
Sort
View
PERCOM
2004
ACM
15 years 9 months ago
Anatomy of a Graduate Ubiquitous/Pervasive Computing Course
This paper presents the author's experience in designing and teaching a graduate level Ubiquitous Computing (Ubicomp) course at Arizona State University. It identifies some o...
S. K. S. Gupta
45
Voted
ATAL
2005
Springer
15 years 3 months ago
Untraceability of mobile agents
In the article we present two untraceability protocols for mobile agents. Comparing to other solutions, the advantage of the protocols is that they support agent’s autonomy in c...
Rafal Leszczyna, Janusz Górski
74
Voted
HOPL
2007
15 years 1 months ago
The evolution of Lua
We report on the birth and evolution of Lua and discuss how it moved from a simple configuration language to a versatile, widely used language that supports extensible semantics, ...
Roberto Ierusalimschy, Luiz Henrique de Figueiredo...
CCR
2010
104views more  CCR 2010»
14 years 7 months ago
I know what you will do next summer
This is a brief journey across the Internet privacy landscape. After trying to convince you about the importance of the problem I will try to present questions of interest and how...
Balachander Krishnamurthy
CCS
2006
ACM
15 years 1 months ago
Hot or not: revealing hidden services by their clock skew
Location-hidden services, as offered by anonymity systems such as Tor, allow servers to be operated under a pseudonym. As Tor is an overlay network, servers hosting hidden service...
Steven J. Murdoch