Sciweavers

26957 search results - page 5200 / 5392
» Information Systems Modernization
Sort
View
159
Voted
GI
2004
Springer
15 years 10 months ago
An Architecture Concept for Mobile P2P File Sharing Services
Abstract: File-sharing in mobile networks has differing demands to a P2P architecture. Resource access and mediation techniques must follow constraints given in 2.5G/3G networks. E...
Frank-Uwe Andersen, Hermann de Meer, Ivan Dedinski...
LISA
2004
15 years 6 months ago
autoMAC: A Tool for Automating Network Moves, Adds, and Changes
It is often difficult and time-consuming to manage computer `moves, adds, and changes' that take place in a switched, subnetted environment. It is even more difficult when th...
Christopher J. Tengi, James M. Roberts, Joseph R. ...
CCS
2007
ACM
15 years 11 months ago
Filtering spam with behavioral blacklisting
Spam filters often use the reputation of an IP address (or IP address range) to classify email senders. This approach worked well when most spam originated from senders with fix...
Anirudh Ramachandran, Nick Feamster, Santosh Vempa...
139
Voted
SCHULE
2007
Springer
15 years 11 months ago
Lesen im Informatikunterricht
: Dass im Informatikunterricht Programme geschrieben werden, ist nicht ungewöhnlich. Ebenso werden Programme entworfen, getestet, analysiert und manchmal auch verändert und erwei...
Carsten Schulte
IMC
2006
ACM
15 years 11 months ago
Malware prevalence in the KaZaA file-sharing network
In recent years, more than 200 viruses have been reported to use a peer-to-peer (P2P) file-sharing network as a propagation vector. Disguised as files that are frequently exchan...
Seungwon Shin, Jaeyeon Jung, Hari Balakrishnan
« Prev « First page 5200 / 5392 Last » Next »