Sciweavers

2454 search results - page 348 / 491
» Privacy in the Information and Communications Technologies
Sort
View
BIOADIT
2004
Springer
15 years 3 months ago
Media Streaming on P2P Networks with Bio-inspired Cache Replacement Algorithm
With the growth of computing power and the proliferation of broadband access to the Internet, the use of media streaming has become widely diffused. By using the P2P communication...
Masahiro Sasabe, Naoki Wakamiya, Masayuki Murata, ...
IH
2004
Springer
15 years 3 months ago
Empirical and Theoretical Evaluation of Active Probing Attacks and Their Countermeasures
A variety of remote sensing attacks allow adversaries to break flow confidentiality and gather mission-critical information in distributed systems. Such attacks are easily supple...
Xinwen Fu, Bryan Graham, Dong Xuan, Riccardo Betta...
87
Voted
COOPIS
2003
IEEE
15 years 3 months ago
Profiling and Matchmaking Strategies in Support of Opportunistic Collaboration
With the recent advances in communications technologies and decentralization of work practices, there has been an increase in distributed, remote, computerized work environments. I...
Adriana Santarosa Vivacqua, Melfry Moreno, Jano Mo...
IEEEAMS
2003
IEEE
15 years 3 months ago
Service Morphing: Integrated System- and Application-Level Service
Service morphing is a set of techniques used to continuously meet an application’s Quality of Service (QoS) needs, in the presence of run-time variations in service locations, p...
Christian Poellabauer, Karsten Schwan, Sandip Agar...
SIGUCCS
2003
ACM
15 years 3 months ago
Enforcing model network citizenship by remote administration
Higher education institutions have been striving to improve services and keep pace with new technologies. In a Higher education environment, the users utilize the available comput...
Prasun Gupta, Mahmoud Pegah