Sciweavers

486 search results - page 71 / 98
» policy 2005
Sort
View
CHI
2005
ACM
15 years 10 months ago
How peer photos influence member participation in online communities
Online communities (OLCs) are gatherings of like -minded people, brought together in cyberspace by shared interests. Creating such communities is not a big challenge; sustaining m...
Nishikant Kapoor, Joseph A. Konstan, Loren G. Terv...
66
Voted
CHI
2005
ACM
15 years 10 months ago
Design and evaluation challenges of serious games
As the computer game industry grows, game capabilities and designs are being re-used for purposes other than entertainment. The study of 'Serious Games', i.e. games for ...
Elaine M. Raybourn, Nathan Bos
PODS
2005
ACM
119views Database» more  PODS 2005»
15 years 9 months ago
Security analysis of cryptographically controlled access to XML documents
Some promising recent schemes for XML access control employ encryption for implementing security policies on published data, avoiding data duplication. In this paper we study one ...
Bogdan Warinschi, Martín Abadi
MOBISYS
2005
ACM
15 years 9 months ago
An overlay MAC layer for 802.11 networks
The widespread availability of 802.11-based hardware has made it the premier choice of both researchers and practitioners for developing new wireless networks and applications. Ho...
Ananth Rao, Ion Stoica
81
Voted
ACSAC
2005
IEEE
15 years 3 months ago
Exploiting Independent State For Network Intrusion Detection
Network intrusion detection systems (NIDSs) critically rely on processing a great deal of state. Often much of this state resides solely in the volatile processor memory accessibl...
Robin Sommer, Vern Paxson