Sciweavers

8623 search results - page 1527 / 1725
» Software engineering for secure systems
Sort
View
TEI
2012
ACM
258views Hardware» more  TEI 2012»
14 years 15 days ago
The HapticTouch toolkit: enabling exploration of haptic interactions
In the real world, touch based interaction relies on haptic feedback (e.g., grasping objects, feeling textures). Unfortunately, such feedback is absent in current tabletop systems...
David Ledo, Miguel A. Nacenta, Nicolai Marquardt, ...
EUROSYS
2006
ACM
16 years 2 months ago
Experiences in building and operating ePOST, a reliable peer-to-peer application
Peer-to-peer (p2p) technology can potentially be used to build highly reliable applications without a single point of failure. However, most of the existing applications, such as ...
Alan Mislove, Ansley Post, Andreas Haeberlen, Pete...
OSDI
2004
ACM
16 years 5 months ago
Automated Worm Fingerprinting
Network worms are a clear and growing threat to the security of today's Internet-connected hosts and networks. The combination of the Internet's unrestricted connectivit...
Sumeet Singh, Cristian Estan, George Varghese, Ste...
WORDS
2003
IEEE
15 years 10 months ago
Foucault's Pendulum in the Distributed Control Lab
The ’Distributed Control Lab’ [6] at Hasso-PlattnerInstitute, University of Potsdam allows experimentation with a variety of physical equipment via the web (intra and internet...
Andreas Rasche, Peter Tröger, Michael Dirska,...
WWW
2008
ACM
16 years 5 months ago
User behavior oriented web spam detection
Combating Web spam has become one of the top challenges for Web search engines. State-of-the-art spam detection techniques are usually designed for specific known types of Web spa...
Yiqun Liu, Min Zhang, Shaoping Ma, Liyun Ru
« Prev « First page 1527 / 1725 Last » Next »