Sciweavers

171 search results - page 26 / 35
» cse 2009
Sort
View
69
Voted
CSE
2009
IEEE
15 years 4 months ago
Anonymity Properties of Stored or Transmitted Data Taken from Bluetooth Scans
—Modern consumer wireless devices are increasingly powerful, making them attractive to use as wireless sensor nodes. At the same time, many use protocol suites such as Bluetooth ...
David Evans, Robert H. Warren
93
Voted
CSE
2009
IEEE
15 years 4 months ago
A Network-Aware Distributed Membership Protocol for Collaborative Defense
— To counteract current trends in network malware, distributed solutions have been developed that harness the power of collaborative end-host sensors. While these systems greatly...
David Zage, Carl Livadas, Eve M. Schooler
72
Voted
CSE
2009
IEEE
15 years 4 months ago
Mining for Gold Farmers: Automatic Detection of Deviant Players in MMOGs
Abstract—Gold farming refers to the illicit practice of gathering and selling virtual goods in online games for real money. Although around one million gold farmers engage in gol...
Muhammad Aurangzeb Ahmad, Brian Keegan, Jaideep Sr...
69
Voted
CSE
2009
IEEE
15 years 4 months ago
Visually and Acoustically Exploring the High-Dimensional Space of Music
Abstract—The permanent growth of personal music collections caused by the ongoing digital revolution asks for novel ways of organization. Traditional list based approaches are—...
Lukas Bossard, Michael Kuhn 0002, Roger Wattenhofe...
CSE
2009
IEEE
15 years 4 months ago
Davis Social Links or: How I Learned to Stop Worrying and Love the Net
—When the Internet was conceived, its fundamental operation was envisioned to be point-to-point communication allowing anybody to talk directly to anybody. With its increasing su...
Matt Spear, Xiaoming Lu, Shyhtsun Felix Wu