Sciweavers

557 search results - page 77 / 112
» Two experiences designing for effective security
Sort
View
PRESENCE
2002
116views more  PRESENCE 2002»
14 years 11 months ago
Evaluating Rules of Interaction for Object Manipulation in Cluttered Virtual Environments
A set of rules is presented for the design of interfaces that allow virtual objects to be manipulated in 3D virtual environments (VEs). The rules differ from other interaction tec...
Roy A. Ruddle, Justin C. D. Savage, Dylan M. Jones
RTAS
1997
IEEE
15 years 4 months ago
Scalable Hardware Priority Queue Architectures for High-Speed Packet Switches
ÐWith effective packet-scheduling mechanisms, modern integrated networks can support the diverse quality-of-service requirements of emerging applications. However, arbitrating bet...
Sung-Whan Moon, Kang G. Shin, Jennifer Rexford
JSAC
2007
263views more  JSAC 2007»
14 years 11 months ago
An Empirical Study of the Coolstreaming+ System
—In recent years, there has been significant interest in adopting the Peer-to-Peer (P2P) technology for Internet live video streaming. There are primarily two reasons behind thi...
Bo Li, Susu Xie, Gabriel Yik Keung, Jiangchuan Liu...
SIGCOMM
2006
ACM
15 years 5 months ago
SybilGuard: defending against sybil attacks via social networks
Peer-to-peer and other decentralized, distributed systems are known to be particularly vulnerable to sybil attacks. In a sybil attack, a malicious user obtains multiple fake ident...
Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, ...
JSAC
2006
181views more  JSAC 2006»
14 years 12 months ago
Information theoretic framework of trust modeling and evaluation for ad hoc networks
Abstract-- The performance of ad hoc networks depends on cooperation and trust among distributed nodes. To enhance security in ad hoc networks, it is important to evaluate trustwor...
Yan Lindsay Sun, Wei Yu, Zhu Han, K. J. Ray Liu