Sciweavers

17920 search results - page 3465 / 3584
» Recentering computer science
Sort
View
ISW
2009
Springer
15 years 10 months ago
Automated Spyware Collection and Analysis
Various online studies on the prevalence of spyware attest overwhelming numbers (up to 80%) of infected home computers. However, the term spyware is ambiguous and can refer to anyt...
Andreas Stamminger, Christopher Kruegel, Giovanni ...
IMC
2009
ACM
15 years 10 months ago
On calibrating enterprise switch measurements
The complexity of modern enterprise networks is ever-increasing, and our understanding of these important networks is not keeping pace. Our insight into intra-subnet traffic (sta...
Boris Nechaev, Vern Paxson, Mark Allman, Andrei Gu...
IMC
2009
ACM
15 years 10 months ago
One-click hosting services: a file-sharing hideout
File sharing using peer-to-peer (p2p) systems is a major Internet application and the leading source of network traffic today. However, the dominance of p2p systems for file sha...
Demetres Antoniades, Evangelos P. Markatos, Consta...
MM
2009
ACM
127views Multimedia» more  MM 2009»
15 years 10 months ago
A crowdsourceable QoE evaluation framework for multimedia content
Until recently, QoE (Quality of Experience) experiments had to be conducted in academic laboratories; however, with the advent of ubiquitous Internet access, it is now possible to...
Kuan-Ta Chen, Chen-Chi Wu, Yu-Chun Chang, Chin-Lau...
MOBICOM
2009
ACM
15 years 10 months ago
Challenge: ultra-low-power energy-harvesting active networked tags (EnHANTs)
This paper presents the design challenges posed by a new class of ultra-low-power devices referred to as Energy-Harvesting Active Networked Tags (EnHANTs). EnHANTs are small, fle...
Maria Gorlatova, Peter R. Kinget, Ioannis Kymissis...
« Prev « First page 3465 / 3584 Last » Next »