Sciweavers

630 search results - page 100 / 126
» Acceptable internet use policy
Sort
View
ATC
2008
Springer
13 years 9 months ago
Intelligent VoIP System in Ad-Hoc Network with Embedded Pseudo SIP Server
Wireless networks and the voice over Internet protocol (VoIP) have recently been widely adapted. VoIP services over Ad-hoc network can be accomplished by middleware embedded in mob...
Lin-huang Chang, Chun-hui Sung, Shih-yi Chiu, Jiun...
COLCOM
2008
IEEE
13 years 9 months ago
Web Canary: A Virtualized Web Browser to Support Large-Scale Silent Collaboration in Detecting Malicious Web Sites
Abstract. Malicious Web content poses a serious threat to the Internet, organizations and users. Current approaches to detecting malicious Web content employ high-powered honey cli...
Jiang Wang, Anup K. Ghosh, Yih Huang
CORR
2010
Springer
136views Education» more  CORR 2010»
13 years 5 months ago
Delay-Constrained Multicast Routing Algorithm Based on Average Distance Heuristic
Multicast is the ability of a communication network to accept a single message from an application and to deliver copies of the message to multiple recipients at different locatio...
Ling Zhou, Wei-xiong Ding, Yu-xi Zhu
CSREASAM
2008
13 years 9 months ago
On Providing Automatic Parental Consent over Information Collection from Children
: Children's privacy has become critical with the increasing use of the Internet for commercial purposes and corresponding increase in requests for information. 65% of childre...
Karthik Channakeshava, Kaigui Bian, Michael S. Hsi...
ICC
2007
IEEE
163views Communications» more  ICC 2007»
14 years 1 months ago
Packet Dispatching Algorithms with the Static Connection Patterns Scheme for Three-Stage Buffered Clos-Network Switches
—Rapid expansion of the Internet and increasing demand for multimedia services fosters an immediate need for the development of new high-capacity networks capable of supporting t...
Janusz Kleban, Hugo Santos