Sciweavers

2399 search results - page 330 / 480
» Knowledge Management and the Design of Distributed Cognition...
Sort
View
PERVASIVE
2007
Springer
14 years 9 months ago
Mobiscopes for Human Spaces
The proliferation of affordable mobile devices with processing and sensing capabilities, together with the rapid growth in ubiquitous network connectivity, herald an era of Mobisc...
Tarek F. Abdelzaher, Yaw Anokwa, Péter Boda...
124
Voted
WWW
2007
ACM
15 years 10 months ago
Is high-quality vod feasible using P2P swarming?
Peer-to-peer technologies are increasingly becoming the medium of choice for delivering media content, both professional and homegrown, to large user populations. Indeed, current ...
Siddhartha Annapureddy, Saikat Guha, Christos Gkan...
CIMCA
2005
IEEE
15 years 3 months ago
Fibered Guard - A Hybrid Intelligent Approach to Denial of Service Prevention
This paper describes the system “Fibered Guard”, which is a hybrid intelligent web access management approach for the prevention of Denial of Service (DoS) and Distributed Deni...
Marvin Oliver Schneider, Jacques Calmet
FAST
2003
14 years 11 months ago
Data Staging on Untrusted Surrogates
We show how untrusted computers can be used to facilitate secure mobile data access. We discuss a novel architecture, data staging, that improves the performance of distributed ...
Jason Flinn, Shafeeq Sinnamohideen, Niraj Tolia, M...
WOWMOM
2005
ACM
133views Multimedia» more  WOWMOM 2005»
15 years 3 months ago
A Statistical Matching Approach to Detect Privacy Violation for Trust-Based Collaborations
Distributed trust and reputation management mechanisms are often proposed as a means of providing assurance in dynamic and open environments by enabling principals to building up ...
Mohamed Ahmed, Daniele Quercia, Stephen Hailes