Sciweavers

15782 search results - page 2913 / 3157
» Network Optimization and Control
Sort
View
IFIP
2010
Springer
14 years 10 months ago
Are BGP Routers Open to Attack? An Experiment
Abstract. The BGP protocol is at the core of the routing infrastructure of the Internet. Across years, BGP has proved to be very stable for its purpose. However, there have been so...
Ludovico Cavedon, Christopher Kruegel, Giovanni Vi...
JCHE
2010
120views more  JCHE 2010»
14 years 10 months ago
The virtual campus of the future: stimulating and simulating civic actions in a virtual world
This paper presents a pre-orientation program for incoming college students, Active Citizenship through Technology (ACT), that engaged students in civic dialogue early in their aca...
Marina Umaschi Bers, Clement Chau
JDCTA
2010
125views more  JDCTA 2010»
14 years 10 months ago
User Evaluation of a Community-centric Music Voting Service
In this paper, we present the user evaluation results of a Community-centric Music Voting service that relies on a DHT-based P2P network. For each user community, an independent D...
Timo Koskela, Janne Julkunen, Otso Kassinen, Mika ...
JDCTA
2010
125views more  JDCTA 2010»
14 years 10 months ago
Safety technologies impacts survey in M-services security provision
Nowadays, Effectiveness and benefits of mobile phone technologies appeared more than expected. During the recent decade, using of mobile phone improved from telephone call tools t...
Fatemeh NasserEslami, Fatemeh Saghafi
SOCINFO
2010
14 years 10 months ago
SocialWiki: Bring Order to Wiki Systems with Social Context
A huge amount of administrative effort is required for large wiki systems to produce and maintain high quality pages with existing naive access control policies. This paper introdu...
Haifeng Zhao, Shaozhi Ye, Prantik Bhattacharyya, J...
« Prev « First page 2913 / 3157 Last » Next »