Sciweavers

1845 search results - page 11 / 369
» From the Internet of Computers to the Internet of Things
Sort
View
ICDCS
2005
IEEE
15 years 5 months ago
Virtual Leashing: Internet-Based Software Piracy Protection
Software-splitting is a technique for protecting software from piracy by removing code fragments from an application and placing them on a remote trusted server. The server provid...
Ori Dvir, Maurice Herlihy, Nir Shavit
HPCN
1999
Springer
15 years 4 months ago
VisualExpresso: Generating a Virtual Reality Internet
Finding knowledge from vast quantities of data is a difficult task, made simpler by visually representing this information. The Internet can be considered a vast (global) database,...
David Cleary, Diarmuid O'Donoghue
AIMS
2011
Springer
14 years 3 months ago
Finding and Analyzing Evil Cities on the Internet
Abstract. IP Geolocation is used to determine the geographical location of Internet users based on their IP addresses. When it comes to security, most of the traditional geolocatio...
Matthijs G. T. van Polen, Giovane Cesar Moreira Mo...
WIOPT
2010
IEEE
14 years 10 months ago
Detecting events in the dynamics of ego-centered measurements of the internet topology
—Detecting events such as major routing changes or congestions in the dynamics of the internet topology is an important but challenging task. We explore here a top-down approach ...
Assia Hamzaoui, Matthieu Latapy, Clémence M...
ACL
2010
14 years 9 months ago
Recommendation in Internet Forums and Blogs
The variety of engaging interactions among users in social medial distinguishes it from traditional Web media. Such a feature should be utilized while attempting to provide intell...
Jia Wang, Qing Li, Yuanzhu Peter Chen, Zhangxi Lin