Sciweavers

325 search results - page 56 / 65
» Designing Good Deceptions in Defense of Information Systems
Sort
View
AIS
2006
Springer
15 years 13 days ago
Togetherness and respect: ethical concerns of privacy in Global Web Societies
Today's computer network technologies are sociologically founded on hunter-gatherer principles; common users may be possible subjects of surveillance and sophisticated Interne...
Gordana Dodig-Crnkovic, Virginia Horniak
105
Voted
LCR
2000
Springer
129views System Software» more  LCR 2000»
15 years 4 months ago
Run-Time Support for Distributed Sharing in Typed Languages
We present a new run-time system for typed programming languages that supports object sharing in a distributed system. The key insight in this system is that the ability to distin...
Y. Charlie Hu, Weimin Yu, Alan L. Cox, Dan S. Wall...
122
Voted
MOBISYS
2010
ACM
15 years 2 months ago
MoVi: mobile phone based video highlights via collaborative sensing
Sensor networks have been conventionally defined as a network of sensor motes that collaboratively detect events and report them to a remote monitoring station. This paper makes a...
Xuan Bao, Romit Roy Choudhury
WWW
2005
ACM
16 years 1 months ago
Algorithmic detection of semantic similarity
Automatic extraction of semantic information from text and links in Web pages is key to improving the quality of search results. However, the assessment of automatic semantic meas...
Ana Gabriela Maguitman, Filippo Menczer, Heather R...
91
Voted
TWC
2008
120views more  TWC 2008»
15 years 7 days ago
Cooperation Enforcement and Learning for Optimizing Packet Forwarding in Autonomous Wireless Networks
In wireless ad hoc networks, autonomous nodes are reluctant to forward others' packets because of the nodes' limited energy. However, such selfishness and noncooperation ...
Charles Pandana, Zhu Han, K. J. Ray Liu