Sciweavers

87 search results - page 10 / 18
» Networks without Borders: Communication despite Disconnectio...
Sort
View
111
Voted
EUROSYS
2008
ACM
15 years 9 months ago
Eudaemon: involuntary and on-demand emulation against zero-day exploits
Eudaemon is a technique that aims to blur the borders between protected and unprotected applications, and brings together honeypot technology and end-user intrusion detection and ...
Georgios Portokalidis, Herbert Bos
91
Voted
ECIS
2003
15 years 2 months ago
Emerging organisations: metateams in major IT projects
During the last decade, teams working on information technology (IT) development and implementation projects have experienced significant transformations. Nowadays, many members o...
Walter D. Fernández, Alan Underwood
125
Voted
SIGCOMM
2010
ACM
15 years 29 days ago
An analysis of social network-based Sybil defenses
Recently, there has been much excitement in the research community over using social networks to mitigate multiple identity, or Sybil, attacks. A number of schemes have been propo...
Bimal Viswanath, Ansley Post, P. Krishna Gummadi, ...
ISM
2005
IEEE
99views Multimedia» more  ISM 2005»
15 years 6 months ago
Video Broadcasting using Overlay Multicast
Despite the availability of high bandwidth Internet access for end-users, video broadcasting over the Internet is not widely spread. Multicast communication decreases the network ...
Dragan Milic, Marc Brogle, Torsten Braun
159
Voted
JSW
2008
196views more  JSW 2008»
15 years 22 days ago
Providing Data Items with Time Constraints in Multi-Channel Broadcasting Environments
In a mobile computing system, users carrying portable devices can access database services from any location without requiring a fixed position in the networking environment. Some ...
Ding-Jung Chiang, Hwei-Jen Lin, Timothy K. Shih