Sciweavers

4455 search results - page 649 / 891
» The family and communication technologies
Sort
View
DIM
2008
ACM
15 years 2 months ago
Anti-phishing based on automated individual white-list
In phishing and pharming, users could be easily tricked into submitting their username/passwords into fraudulent web sites whose appearances look similar as the genuine ones. The ...
Ye Cao, Weili Han, Yueran Le
ACMDIS
2010
ACM
15 years 1 months ago
A tale of two publics: democratizing design at the margins
The design and use of Information and Communication Technology (ICT) has now evolved beyond its workplace origins to the wider public, expanding to people who live at the margins ...
Christopher A. Le Dantec, Jim Christensen, Mark Ba...
WWW
2010
ACM
15 years 1 months ago
A characterization of online browsing behavior
In this paper, we undertake a large-scale study of online user behavior based on search and toolbar logs. We propose a new CCS taxonomy of pageviews consisting of Content (news, p...
Ravi Kumar, Andrew Tomkins
PPL
2008
185views more  PPL 2008»
15 years 1 months ago
On Design and Application Mapping of a Network-on-Chip(NoC) Architecture
As the number of integrated IP cores in the current System-on-Chips (SoCs) keeps increasing, communication requirements among cores can not be sufficiently satisfied using either ...
Jun Ho Bahn, Seung Eun Lee, Yoon Seok Yang, Jungso...
NETWORK
2006
186views more  NETWORK 2006»
15 years 1 months ago
Multiuser cross-layer resource allocation for video transmission over wireless networks
With the advancement of video-compression technology and the wide deployment of wireless networks, there is an increasing demand for wireless video communication services, and man...
Guan-Ming Su, Zhu Han, Min Wu, K. J. Ray Liu