Sciweavers

18918 search results - page 3678 / 3784
» Using Technology in Teaching
Sort
View
IMC
2004
ACM
15 years 10 months ago
On scalable attack detection in the network
Current intrusion detection and prevention systems seek to detect a wide class of network intrusions (e.g., DoS attacks, worms, port scans) at network vantage points. Unfortunatel...
Ramana Rao Kompella, Sumeet Singh, George Varghese
IMC
2004
ACM
15 years 10 months ago
On the responsiveness of DNS-based network control
For the last few years, large Web content providers interested in improving their scalability and availability have increasingly turned to three techniques: mirroring, content dis...
Jeffrey Pang, Aditya Akella, Anees Shaikh, Balacha...
JCDL
2004
ACM
106views Education» more  JCDL 2004»
15 years 10 months ago
Sharing encountered information: digital libraries get a social life
As part of a more extensive study of reading-related practices, we have explored how people share information they encounter in their everyday reading as a complement to the more ...
Catherine C. Marshall, Sara A. Bly
MM
2004
ACM
154views Multimedia» more  MM 2004»
15 years 10 months ago
Bio-Fi: inverse biotelemetry projects
Bio-Fi is a collection of art projects undertaken by S.W.A.M.P. (Studies of Work Atmospheres and Mass Production), collaborative art projects by Douglas Easterly and Matt Kenyon. ...
Douglas Easterly
MM
2004
ACM
136views Multimedia» more  MM 2004»
15 years 10 months ago
Fingerprinting and forensic analysis of multimedia
One of the prime reasons movie and music studios have ignored the Internet for open-networked multimedia content delivery, has been the lack of a technology that can support a sec...
Daniel Schonberg, Darko Kirovski
« Prev « First page 3678 / 3784 Last » Next »