Sciweavers

20638 search results - page 4045 / 4128
» Computer Networks
Sort
View
SOUPS
2006
ACM
15 years 3 months ago
The methodology and an application to fight against Unicode attacks
Unicode is becoming a dominant character representation format for information processing. This presents a very dangerous usability and security problem for many applications. The...
Anthony Y. Fu, Xiaotie Deng, Liu Wenyin, Greg Litt...
MM
2005
ACM
103views Multimedia» more  MM 2005»
15 years 3 months ago
Simulated virtual market place by using voiscape communication medium
We are developing a new voice communication medium called voiscape. Voiscape enables natural and seamless bi-directional voice communication by using sound to create a virtual sou...
Yasusi Kanada
SIGECOM
2005
ACM
134views ECommerce» more  SIGECOM 2005»
15 years 3 months ago
Congestion games with failures
We introduce a new class of games, congestion games with failures (CGFs), which extends the class of congestion games to allow for facility failures. In a basic CGF (BCGF) agents ...
Michal Penn, Maria Polukarov, Moshe Tennenholtz
STORAGESS
2005
ACM
15 years 3 months ago
Toward a threat model for storage systems
The growing number of storage security breaches as well as the need to adhere to government regulations is driving the need for greater storage protection. However, there is the l...
Ragib Hasan, Suvda Myagmar, Adam J. Lee, William Y...
SIGCOMM
2004
ACM
15 years 3 months ago
The design and implementation of a next generation name service for the internet
Name services are critical for mapping logical resource names to physical resources in large-scale distributed systems. The Domain Name System (DNS) used on the Internet, however,...
Venugopalan Ramasubramanian, Emin Gün Sirer
« Prev « First page 4045 / 4128 Last » Next »