Sciweavers

557 search results - page 70 / 112
» Two experiences designing for effective security
Sort
View
ICALT
2006
IEEE
15 years 6 months ago
Vicarious Learning and Multimodal Dialogue
Vicarious Learning is learning from watching others learn. We believe that this is a powerful model for computer-based learning. Learning episodes can be captured and replayed to ...
John Lee
ACSAC
2007
IEEE
15 years 6 months ago
HoneyIM: Fast Detection and Suppression of Instant Messaging Malware in Enterprise-Like Networks
Instant messaging (IM) has been one of most frequently used malware attack vectors due to its popularity. Distinct from other malware, it is straightforward for IM malware to fin...
Mengjun Xie, Zhenyu Wu, Haining Wang
INFOCOM
2010
IEEE
14 years 9 months ago
HaND: Fast Handoff with Null Dwell Time for IEEE 802.11 Networks
How to reduce the handoff delay and how to make appropriate handoff decisions are two fundamental challenges in designing an effective handoff scheme for 802.11 networks to provide...
Xi Chen, Daji Qiao
ICMCS
2006
IEEE
181views Multimedia» more  ICMCS 2006»
15 years 6 months ago
A Novel Distributed and Practical Incentive Mechanism for Peer to Peer Live Video Streaming
The successful deployment of peer-to-peer (P2P) live video streaming systems has practically demonstrated that it can scale to reliably support a large population of peers. Howeve...
Yun Tang, Lifeng Sun, Meng Zhang, Shiqiang Yang, Y...
VEE
2006
ACM
116views Virtualization» more  VEE 2006»
15 years 5 months ago
Relative factors in performance analysis of Java virtual machines
Many new Java runtime optimizations report relatively small, single-digit performance improvements. On modern virtual and actual hardware, however, the performance impact of an op...
Dayong Gu, Clark Verbrugge, Etienne M. Gagnon