Sciweavers

3130 search results - page 551 / 626
» Collusion without communication
Sort
View
IMC
2009
ACM
15 years 12 months ago
One-click hosting services: a file-sharing hideout
File sharing using peer-to-peer (p2p) systems is a major Internet application and the leading source of network traffic today. However, the dominance of p2p systems for file sha...
Demetres Antoniades, Evangelos P. Markatos, Consta...
IWCMC
2009
ACM
15 years 12 months ago
Adaptive antenna selection at mobile stations for SDMA in WiMAX networks
The IEEE 802.16/WiMAX standards has fully embraced multi-antenna technology and can, thus, deliver robust performance and high transmission rates. Nevertheless, due to its inheren...
Tairan Wang, Zhifeng Tao, Andreas F. Molisch, Phil...
SACMAT
2009
ACM
15 years 12 months ago
Analysis of virtual machine system policies
The recent emergence of mandatory access (MAC) enforcement for virtual machine monitors (VMMs) presents an opportunity to enforce a security goal over all its virtual machines (VM...
Sandra Rueda, Hayawardh Vijayakumar, Trent Jaeger
SIGMETRICS
2009
ACM
182views Hardware» more  SIGMETRICS 2009»
15 years 12 months ago
The age of gossip: spatial mean field regime
Disseminating a piece of information, or updates for a piece of information, has been shown to benefit greatly from simple randomized procedures, sometimes referred to as gossipi...
Augustin Chaintreau, Jean-Yves Le Boudec, Nikodin ...
W4A
2009
ACM
15 years 12 months ago
Accessibility perspectives on enabling South African sign language in the South African national accessibility portal
Persons with disabilities are often marginalised from economy and society due to the lack of access to disability related information and services. Through the use of assistive te...
Louis Coetzee, Guillaume J.-L. Olivrin, Ilse Vivie...