Sciweavers

537 search results - page 92 / 108
» Buy-at-Bulk Network Design with Protection
Sort
View
CCS
2008
ACM
15 years 19 days ago
Flexible security configuration for virtual machines
Virtual machines are widely accepted as a promising basis for building secure systems. However, while virtual machines offer effective mechanisms to create isolated environments, ...
Sandra Rueda, Yogesh Sreenivasan, Trent Jaeger
CEAS
2005
Springer
15 years 18 days ago
Computers beat Humans at Single Character Recognition in Reading based Human Interaction Proofs (HIPs)
Human interaction proofs (HIPs) have become commonplace on the internet for protecting free online services from abuse by automated scripts/bots. They are challenges designed to b...
Kumar Chellapilla, Kevin Larson, Patrice Y. Simard...
WSC
2001
14 years 12 months ago
Supply chain agent decision aid system (SCADAS)
Supply chain decisions are improved with access to global information. However, supply chain partners are frequently hesitant to provide full access to all the information within ...
Anurag Gupta, Larry Whitman, Ramesh K. Agarwal
ECSCW
1993
14 years 12 months ago
Culture and Control in a Media Space
: Media spaces integrate audio, video and computer networking technology in order to provide a rich communicative environment for collaboration. The connectivity which they provide...
Paul Dourish
CCR
2006
110views more  CCR 2006»
14 years 10 months ago
On the feasibility of commercial, legal P2P content distribution
A spirited panel was recently held at the 10th International Web Caching and Content Distribution workshop on the future of P2P in content distribution [1]. After more than ten ye...
Pablo Rodriguez, See-Mong Tan, Christos Gkantsidis