Sciweavers

3686 search results - page 609 / 738
» Comprehensive comprehensions
Sort
View
SIGMETRICS
2009
ACM
122views Hardware» more  SIGMETRICS 2009»
15 years 8 months ago
Botnet spam campaigns can be long lasting: evidence, implications, and analysis
Accurately identifying spam campaigns launched by a large number of bots in a botnet allows for accurate spam campaign signature generation and hence is critical to defeating spam...
Abhinav Pathak, Feng Qian, Y. Charlie Hu, Zhuoqing...
SIGUCCS
2009
ACM
15 years 8 months ago
The many benefits of cultivating a community among IT staff
Conference Abstracts October 11-14, 2009 t provides the abstracts and the author(s)’ name(s) for the technical program. The actual presenter(s) may vary. Updated September 20, 20...
Ken Layng
SOUPS
2009
ACM
15 years 8 months ago
A "nutrition label" for privacy
We used an iterative design process to develop a privacy label that presents to consumers the ways organizations collect, use, and share personal information. Many surveys have sh...
Patrick Gage Kelley, Joanna Bresee, Lorrie Faith C...
SYSTOR
2009
ACM
15 years 8 months ago
Energy and performance evaluation of lossless file data compression on server systems
Data compression has been claimed to be an attractive solution to save energy consumption in high-end servers and data centers. However, there has not been a study to explore this...
Rachita Kothiyal, Vasily Tarasov, Priya Sehgal, Er...
WOWMOM
2009
ACM
146views Multimedia» more  WOWMOM 2009»
15 years 8 months ago
When opportunity proceeds from autonomy: A tour-based architecture for disconnected mobile sensors
We consider the case of sparse mobile sensors deployed to implement missions in challenging environments. This paper explores a notion of tour networks that is well suited to circ...
Michel Charpentier, Radim Bartos, Swapnil Bhatia