Sciweavers

312 search results - page 56 / 63
» Technology for boundaries
Sort
View
CHI
2003
ACM
15 years 9 months ago
Hardware companions?: what online AIBO discussion forums reveal about the human-robotic relationship
In this study, we investigated people's relationships with AIBO, a robotic pet, through 6,438 spontaneous postings in online AIBO discussion forums. Results showed that AIBO ...
Batya Friedman, Peter H. Kahn Jr., Jennifer Hagman
IMC
2009
ACM
15 years 4 months ago
On calibrating enterprise switch measurements
The complexity of modern enterprise networks is ever-increasing, and our understanding of these important networks is not keeping pace. Our insight into intra-subnet traffic (sta...
Boris Nechaev, Vern Paxson, Mark Allman, Andrei Gu...
SACMAT
2006
ACM
15 years 3 months ago
Traust: a trust negotiation-based authorization service for open systems
In recent years, trust negotiation (TN) has been proposed as a novel access control solution for use in open system environments in which resources are shared across organizationa...
Adam J. Lee, Marianne Winslett, Jim Basney, Von We...
ITCC
2005
IEEE
15 years 3 months ago
Customizing a Geographical Routing Protocol for Wireless Sensor Networks
— Several problems are required to be fixed in order to apply geographical routing protocol Greedy Perimeter Stateless Routing (GPSR) in wireless sensor networks. First, GPSR is...
Jian Chen, Yong Guan, Udo W. Pooch
SISW
2005
IEEE
15 years 3 months ago
Towards Protecting Sensitive Files in a Compromised System
Protecting sensitive files from a compromised system helps administrator to thwart many attacks, discover intrusion trails, and fast restore the system to a safe state. However, ...
Xin Zhao, Kevin Borders, Atul Prakash