Sciweavers

3611 search results - page 619 / 723
» Computer Supported Collaborative Research
Sort
View
107
Voted
NSPW
2003
ACM
15 years 7 months ago
Owner-controlled information
Large-scale data breaches exposing sensitive personal information are becoming commonplace. For numerous reasons, conventional personal (identification) information leaks from da...
Carrie Gates, Jacob Slonim
121
Voted
SIGCOMM
2003
ACM
15 years 7 months ago
Making gnutella-like P2P systems scalable
Napster pioneered the idea of peer-to-peer file sharing, and supported it with a centralized file search facility. Subsequent P2P systems like Gnutella adopted decentralized sea...
Yatin Chawathe, Sylvia Ratnasamy, Lee Breslau, Nic...
129
Voted
SIGCOMM
2003
ACM
15 years 7 months ago
A high-level programming environment for packet trace anonymization and transformation
Packet traces of operational Internet traffic are invaluable to network research, but public sharing of such traces is severely limited by the need to first remove all sensitive...
Ruoming Pang, Vern Paxson
FPGA
2003
ACM
161views FPGA» more  FPGA 2003»
15 years 7 months ago
Implementation of BEE: a real-time large-scale hardware emulation engine
This paper describes the hardware implementation of a real-time, large-scale, multi-chip FPGA (Field Programmable Gate Array) based emulation engine with a capacity of 10 million ...
Chen Chang, Kimmo Kuusilinna, Brian C. Richards, R...
CHI
2009
ACM
15 years 7 months ago
Passive photography from a creative perspective: "If I would just shoot the same thing for seven days, it's like... What's the p
This paper aims to contribute with an understanding of meaningful experiences of photography, to support reflection upon the design of future camera devices. We have conducted a s...
Sara Ljungblad