Sciweavers

847 search results - page 99 / 170
» Video-on-Demand Networks: Design Approaches and Future Chall...
Sort
View
DIMVA
2007
14 years 11 months ago
A Study of Malcode-Bearing Documents
By exploiting the object-oriented dynamic composability of modern document applications and formats, malcode hidden in otherwise inconspicuous documents can reach third-party appli...
Wei-Jen Li, Salvatore J. Stolfo, Angelos Stavrou, ...
COMCOM
2000
148views more  COMCOM 2000»
14 years 9 months ago
Advanced service provisioning based on mobile agents
Service provisioning is currently a challenging issue to offer future telecommunication services efficiently and at the same time in a flexible and user friendly manner. As a cont...
Peyman Farjami, Carmelita Görg, Frank Bell
PERCOM
2006
ACM
15 years 9 months ago
Concept for Hierarchical and Distributed Processing of Area Based Triggers
Area based triggers denote notifications being generated if a mobile client changes its spatial relation to a defined area, e.g. if it enters or leaves it. By these triggers, new ...
Sven D. Hermann, Günter Schäfer, Adam Wo...
CNSR
2011
IEEE
238views Communications» more  CNSR 2011»
14 years 1 months ago
Measurement Study on PPLive Based on Channel Popularity
Abstract—In recent years, Peer-to-Peer (P2P) streaming systems experienced tremendous growth and became one of the largest bandwidth consumer on Internet. PPLive, one of the most...
Ruixuan Li, Guoqiang Gao, Weijun Xiao, Zhiyong Xu
EUROSYS
2011
ACM
14 years 1 months ago
Keypad: an auditing file system for theft-prone devices
This paper presents Keypad, an auditing file system for theftprone devices, such as laptops and USB sticks. Keypad provides two important properties. First, Keypad supports fine...
Roxana Geambasu, John P. John, Steven D. Gribble, ...