Sciweavers

2047 search results - page 217 / 410
» Pervasive Computing on Active Networks
Sort
View
WSDM
2010
ACM
172views Data Mining» more  WSDM 2010»
16 years 2 months ago
Early Online Identification of Attention Gathering Items In Social Media
Activity in social media such as blogs, micro-blogs, social networks, etc is manifested via interaction that involves text, images, links and other information items. Naturally, s...
Michael Mathioudakis, Nick Koudas, Peter Marbach
IMC
2007
ACM
15 years 6 months ago
Measuring load-balanced paths in the internet
Tools to measure internet properties usually assume the existence of just one single path from a source to a destination. However, load-balancing capabilities, which create multip...
Brice Augustin, Timur Friedman, Renata Teixeira
KIVS
2009
Springer
15 years 11 months ago
A Middleware for the Controlled Information Exchange Between Online Games and Internet Applications
Multiplayer Online Games (MOGs) are a thriving market leading to a multiplicity of game related internet applications. Enabling information exchange between games and these applica...
Sonja Bergsträsser, Tomas Hildebrandt, Christ...
NCA
2003
IEEE
15 years 10 months ago
Admission Control in Peer Groups
Security in collaborative peer groups is an active research topic. Most previous work focused on key management without addressing an important pre-requisite: admission control, i...
Yongdae Kim, Daniele Mazzocchi, Gene Tsudik
NSDI
2008
15 years 7 months ago
Behind Phishing: An Examination of Phisher Modi Operandi
Phishing costs Internet users billions of dollars a year. Using various data sets collected in real-time, this paper analyzes various aspects of phisher modi operandi. We examine ...
D. Kevin McGrath, Minaxi Gupta