Sciweavers

2200 search results - page 380 / 440
» Hop Integrity in Computer Networks
Sort
View
ICDCS
2009
IEEE
16 years 8 days ago
ISP Friend or Foe? Making P2P Live Streaming ISP-Aware
Abstract: Current peer-to-peer systems are network-agnostic, often generating large volumes of unnecessary inter-ISP traffic. Although recent work has shown the benefits of ISP-a...
Fabio Picconi, Laurent Massoulié
CHI
2010
ACM
15 years 10 months ago
Here's what i did: sharing and reusing web activity with ActionShot
ActionShot is an integrated web browser tool that creates a fine-grained history of users’ browsing activities by continually recording their browsing actions at the level of in...
Ian Li, Jeffrey Nichols, Tessa A. Lau, Clemens Dre...
SC
2009
ACM
15 years 10 months ago
Building the PolarGrid portal using web 2.0 and OpenSocial
Science requires collaboration. In this paper, we investigate the feasibility of coupling current social networking techniques to science gateways to provide a scientific collabor...
Zhenhua Guo, Raminderjeet Singh, Marlon E. Pierce
CSE
2009
IEEE
15 years 10 months ago
A Lightweight Architecture for Secure Two-Party Mobile Payment
The evolution of wireless networks and mobile devices has resulted in increased concerns about performance and security of mobile payment systems. In this paper we propose SA2pMP,...
Yunpu Zhu, Jacqueline E. Rice
CSE
2009
IEEE
15 years 10 months ago
Security Implications of Virtualization: A Literature Study
— Data centers accumulate corporate and personal data at a rapid pace. Driven by economy of scale and the high bandwidth of today’s network connections, more and more businesse...
André van Cleeff, Wolter Pieters, Roel Wier...