Sciweavers

4262 search results - page 188 / 853
» Internet and Intranet Computing
Sort
View
IEEEARES
2007
IEEE
15 years 10 months ago
Compartmented Security for Browsers - Or How to Thwart a Phisher with Trusted Computing
Identity theft through phishing attacks has become a major concern for Internet users. Typically, phishing attacks aim at luring the user to a faked web site to disclose personal ...
Sebastian Gajek, Ahmad-Reza Sadeghi, Christian St&...
CROSSROADS
2010
14 years 10 months ago
Massive multiplayer human computation for fun, money, and survival
Crowdsourcing is an effective tool to solve hard tasks. By bringing 100,000s of people to work on simple tasks that only humans can do, we can go far beyond traditional models of ...
Lukas Biewald
128
Voted
WWW
2004
ACM
16 years 4 months ago
A scheme of service discovery and control on ubiquitous devices
In this paper, we describe the discovery of service and controlling them in ubiquitous devices. Categories and Subject Descriptors H.5.2 [User Interface]: General Terms Design Key...
Mitsutaka Watanabe, Ken-ichi Takaya, Akishi Seo, M...
137
Voted
OTM
2007
Springer
15 years 10 months ago
Fine Grained Access Control with Trust and Reputation Management for Globus
Abstract. We propose an integrated architecture, extending a framework for fine grained access control of Grid computational services, with an inference engine managing reputation...
Maurizio Colombo, Fabio Martinelli, Paolo Mori, Ma...
GI
2004
Springer
15 years 9 months ago
Methodology for Estimating Network Distances of Gnutella Neighbors
Abstract: In this paper we ask the question how much does the neighborhood selection process of a P2P protocol such as Gnutella respect the underlying Internet topology.
Vinay Aggarwal, Stefan Bender, Anja Feldmann, Arne...