Sciweavers

7457 search results - page 1400 / 1492
» The Dynamics of Computing Agent Systems
Sort
View
MUM
2004
ACM
154views Multimedia» more  MUM 2004»
15 years 7 months ago
Plug-and-play application platform: towards mobile peer-to-peer
While peer-to-peer (P2P) has emerged as a new hot communication concept among the Internet users, mobile usage of P2P applications is still taking its first steps. This article fi...
Erkki Harjula, Mika Ylianttila, Jussi Ala-Kurikka,...
MUM
2004
ACM
99views Multimedia» more  MUM 2004»
15 years 7 months ago
The Road Rager: making use of traffic encounters in a mobile multiplayer game
We present Road Rager, a prototype built in order to explore our hypothesis that proximity and a possibility to identify other players during temporary encounters could spur socia...
Liselott Brunnberg
CCS
2004
ACM
15 years 7 months ago
Operational experiences with high-volume network intrusion detection
In large-scale environments, network intrusion detection systems (NIDSs) face extreme challenges with respect to traffic volume, traffic diversity, and resource management. Whil...
Holger Dreger, Anja Feldmann, Vern Paxson, Robin S...
ESA
2004
Springer
143views Algorithms» more  ESA 2004»
15 years 7 months ago
Data Migration on Parallel Disks
Our work is motivated by the problem of managing data on storage devices, typically a set of disks. Such storage servers are used as web servers or multimedia servers, for handling...
Leana Golubchik, Samir Khuller, Yoo Ah Kim, Svetla...
ESORICS
2004
Springer
15 years 7 months ago
Parameterized Authentication
We describe an approach to sensor-based authentication that can adapt to accommodate incomplete, unreliable, or inaccurate input provided to the system. Parameterized Authenticatio...
Michael J. Covington, Mustaque Ahamad, Irfan A. Es...
« Prev « First page 1400 / 1492 Last » Next »