Sciweavers

14704 search results - page 2840 / 2941
» computing 2007
Sort
View
137
Voted
LCN
2007
IEEE
15 years 9 months ago
Sender Access Control in IP Multicast
—Multicasting has not been widely adopted until now, due to lack of access control over the group members. The Authentication, Authorization and Accounting (AAA) protocols are be...
Salekul Islam, J. William Atwood
RAID
2007
Springer
15 years 9 months ago
"Out-of-the-Box" Monitoring of VM-Based High-Interaction Honeypots
Honeypot has been an invaluable tool for the detection and analysis of network-based attacks by either human intruders or automated malware in the wild. The insights obtained by de...
Xuxian Jiang, Xinyuan Wang
139
Voted
RAID
2007
Springer
15 years 9 months ago
SpyShield: Preserving Privacy from Spy Add-Ons
Spyware infections are becoming extremely pervasive, posing a grave threat to Internet users’ privacy. Control of such an epidemic is increasingly difficult for the existing def...
Zhuowei Li, XiaoFeng Wang, Jong Youl Choi
195
Voted
SCALESPACE
2007
Springer
15 years 9 months ago
Piecewise Constant Level Set Method for 3D Image Segmentation
Level set methods have been proven to be efficient tools for tracing interface problems. Recently, some variants of the Osher- Sethian level set methods, which are called the Piece...
Are Losnegård, Oddvar Christiansen, Xue-Chen...
COLCOM
2007
IEEE
15 years 9 months ago
Peer2Schedule - an experimental peer-to-peer application to support present collaboration
Abstract—This paper describes experiences from implementing an experimental mobile peer-to-peer application called Peer2Schedule aimed at improving and supporting collaboration w...
Alf Inge Wang, Peter Nicolai Motzfeldt
« Prev « First page 2840 / 2941 Last » Next »