Sciweavers

2904 search results - page 323 / 581
» Internet Infrastructure Security
Sort
View
163
Voted
PET
2012
Springer
13 years 7 months ago
Evading Censorship with Browser-Based Proxies
While Internet access to certain sites is blocked in some parts of the world, these restrictions are often circumvented using proxies outside the censored region. Often these proxi...
David Fifield, Nate Hardison, Jonathan Ellithorpe,...
WWW
2001
ACM
16 years 5 months ago
Mixed-initiative, multi-source information assistants
While the information resources on the Web are vast, the sources are often hard to find, painful to use, and difficult to integrate. We have developed the Heracles framework for b...
Craig A. Knoblock, Steven Minton, José Luis...
ACMSE
2009
ACM
15 years 11 months ago
The effects of network delay on task performance in a visual-haptic collaborative environment
Computer networks have grown considerably over the past decade. Faster and cheaper Internet connections have brought millions of PCs into a domain where rich content and fast down...
Benjamin M. Lambeth, James LaPlant, Elena Clapan, ...
ECUMN
2007
Springer
15 years 11 months ago
Scalable Mobile Multimedia Group Conferencing Based on SIP Initiated SSM
Multimedia group communication emerges to focal interest at mobile devices, enriching voice or video conferencing and complex collaborative environments. The Internet uniquely pro...
Thomas C. Schmidt, Matthias Wählisch, Hans L....
HICSS
2006
IEEE
114views Biometrics» more  HICSS 2006»
15 years 11 months ago
A Formal Approach towards Assessing the Effectiveness of Anti-Spam Procedures
Spam e-mails have become a serious technological and economic problem. So far we have been reasonably able to resist spam e-mails and use the Internet for regular communication by...
Guido Schryen