Sciweavers

537 search results - page 68 / 108
» Buy-at-Bulk Network Design with Protection
Sort
View
70
Voted
COMCOM
2006
96views more  COMCOM 2006»
15 years 19 days ago
An open source traffic engineering toolbox
We present the TOTEM open source Traffic Engineering (TE) toolbox and a set of TE methods that we have designed and/or integrated. These methods cover intra-domain and inter-domai...
Guy Leduc, Henrik Abrahamsson, Simon Balon, Sandfo...
109
Voted
CHI
2011
ACM
14 years 4 months ago
Oops, I did it again: mitigating repeated access control errors on facebook
We performed a study of Facebook users to examine how they coped with limitations of the Facebook privacy settings interface. Students graduating and joining the workforce create ...
Serge Egelman, Andrew Oates, Shriram Krishnamurthi
120
Voted
WWW
2009
ACM
16 years 1 months ago
Collective privacy management in social networks
Social Networking is one of the major technological phenomena of the Web 2.0, with hundreds of millions of people participating. Social networks enable a form of self expression f...
Anna Cinzia Squicciarini, Mohamed Shehab, Federica...
109
Voted
IWCMC
2009
ACM
15 years 7 months ago
Dynamic trust establishment in emergency ad hoc networks
This paper proposes a dynamic trust establishment protocol that enables the nodes of an ad hoc network to establish security associations among each other in a distributed and pee...
Christos A. Papageorgiou, Konstantinos Birkos, Tas...
104
Voted
SASN
2003
ACM
15 years 5 months ago
Location-based pairwise key establishments for static sensor networks
Sensor networks are ideal candidates for applications such as target tracking and environment monitoring. Security in sensor networks is critical when there are potential adversar...
Donggang Liu, Peng Ning