Sciweavers

107 search results - page 7 / 22
» Accessibility of Internet websites through time
Sort
View
TDSC
2011
13 years 3 months ago
Nymble: Blocking Misbehaving Users in Anonymizing Networks
—Anonymizing networks such as Tor allow users to access Internet services privately by using a series of routers to hide the client’s IP address from the server. The success of...
Patrick P. Tsang, Apu Kapadia, Cory Cornelius, Sea...
ELPUB
2007
ACM
14 years 11 days ago
Evaluating Digital Humanities Resources: The LAIRAH Project Checklist and the Internet Shakespeare Editions Project
The following paper presents a case study of the way that the research done by the LAIRAH project may be applied in the case of a real digital resource for humanities scholarship....
Claire Warwick, Melissa Terras, Isabel Galina, Pau...
TMC
2010
182views more  TMC 2010»
13 years 6 months ago
Rate Adaptation in Congested Wireless Networks through Real-Time Measurements
—Rate adaptation is a critical component that impacts the performance of IEEE 802.11 wireless networks. In congested networks, traditional rate adaptation algorithms have been sh...
Prashanth Aravinda Kumar Acharya, Ashish Sharma, E...
IEPOL
2010
130views more  IEPOL 2010»
13 years 5 months ago
Piracy or promotion? The impact of broadband Internet penetration on DVD sales
ABSTRACT Digital computer networks represent a disruptive technology, with the potential to create or destroy economic value in established industries. These opportunities and chal...
Michael D. Smith, Rahul Telang
ICWS
2007
IEEE
13 years 10 months ago
Guarding Sensitive Information Streams through the Jungle of Composite Web Services
Complex and dynamic web service compositions may introduce unpredictable and unintentional sharing of security-sensitive data (e.g., credit card numbers) as well as unexpected vul...
Jinpeng Wei, Lenin Singaravelu, Calton Pu