Sciweavers

537 search results - page 68 / 108
» Buy-at-Bulk Network Design with Protection
Sort
View
COMCOM
2006
96views more  COMCOM 2006»
14 years 11 months ago
An open source traffic engineering toolbox
We present the TOTEM open source Traffic Engineering (TE) toolbox and a set of TE methods that we have designed and/or integrated. These methods cover intra-domain and inter-domai...
Guy Leduc, Henrik Abrahamsson, Simon Balon, Sandfo...
93
Voted
CHI
2011
ACM
14 years 2 months ago
Oops, I did it again: mitigating repeated access control errors on facebook
We performed a study of Facebook users to examine how they coped with limitations of the Facebook privacy settings interface. Students graduating and joining the workforce create ...
Serge Egelman, Andrew Oates, Shriram Krishnamurthi
WWW
2009
ACM
15 years 11 months ago
Collective privacy management in social networks
Social Networking is one of the major technological phenomena of the Web 2.0, with hundreds of millions of people participating. Social networks enable a form of self expression f...
Anna Cinzia Squicciarini, Mohamed Shehab, Federica...
IWCMC
2009
ACM
15 years 5 months ago
Dynamic trust establishment in emergency ad hoc networks
This paper proposes a dynamic trust establishment protocol that enables the nodes of an ad hoc network to establish security associations among each other in a distributed and pee...
Christos A. Papageorgiou, Konstantinos Birkos, Tas...
SASN
2003
ACM
15 years 4 months ago
Location-based pairwise key establishments for static sensor networks
Sensor networks are ideal candidates for applications such as target tracking and environment monitoring. Security in sensor networks is critical when there are potential adversar...
Donggang Liu, Peng Ning