Sciweavers

2503 search results - page 324 / 501
» Building Computer Network Attacks
Sort
View
PRDC
2005
IEEE
15 years 7 months ago
A Multi-Faceted Approach towards Spam-Resistible Mail
As checking SPAM became part of our daily life, unsolicited bulk e-mails (UBE) have become unmanageable and intolerable. Bulk volume of spam e-mails delivering to mail transfer ag...
Ming-Wei Wu, Yennun Huang, Shyue-Kung Lu, Ing-Yi C...
VRST
2006
ACM
15 years 7 months ago
Media productions for a dome display system
As the interest of the public for new forms of media grows, museums and theme parks select real time Virtual Reality productions as their presentation medium. Based on threedimens...
Athanasios Gaitatzes, Georgios Papaioannou, Dimitr...
PERCOM
2005
ACM
16 years 1 months ago
Re-Conceptualizing Learning Environments: A Framework for Pervasive eLearning
Pervasive eLearning requires a novel media perspective on learning objects. Instead of viewing handhelds or smart phones as minimized PCs we would like to propose a perspective on...
Reinhard Keil-Slawik, Thorsten Hampel, Bernd E&szl...
EUROSYS
2008
ACM
15 years 10 months ago
Itrustpage: a user-assisted anti-phishing tool
Despite the many solutions proposed by industry and the research community to address phishing attacks, this problem continues to cause enormous damage. Because of our inability t...
Troy Ronda, Stefan Saroiu, Alec Wolman
SENSYS
2009
ACM
15 years 8 months ago
Optimal clock synchronization in networks
Having access to an accurate time is a vital building block in all networks; in wireless sensor networks even more so, because wireless media access or data fusion may depend on i...
Christoph Lenzen, Philipp Sommer, Roger Wattenhofe...