Sciweavers

818 search results - page 102 / 164
» An Internet Voting System Supporting User Privacy
Sort
View
GLOBECOM
2008
IEEE
14 years 3 months ago
Friendly P2P: Application-Level Congestion Control for Peer-to-Peer Applications
Abstract—Peer-to-Peer (P2P) file sharing applications use multiple TCP connections between peers to transfer data. The aggressiveness and robustness of P2P technology remarkably...
YaNing Liu, Hongbo Wang, Yu Lin, Shiduan Cheng, Gw...
IMC
2010
ACM
13 years 6 months ago
On the feasibility of effective opportunistic spectrum access
Dynamic spectrum access networks are designed to allow today's bandwidth hungry "secondary devices" to share spectrum allocated to legacy devices, or "primary ...
Vinod Kone, Lei Yang, Xue Yang, Ben Y. Zhao, Haita...
WWW
2008
ACM
14 years 9 months ago
Forcehttps: protecting high-security web sites from network attacks
As wireless networks proliferate, web browsers operate in an increasingly hostile network environment. The HTTPS protocol has the potential to protect web users from network attac...
Collin Jackson, Adam Barth
CHI
2001
ACM
14 years 9 months ago
Single display privacyware: augmenting public displays with private information
The research area of Single Display Groupware (SDG) confronts the standard model of computing interaction, one user working on one computer, by investigating how to best support g...
Garth B. D. Shoemaker, Kori Inkpen
ICONFERENCE
2011
13 years 3 months ago
Beyond promotion and protection: creators, audiences and common ground in user-generated media
In this paper, we present findings from a qualitative study of producers in a specific creative domain—online digital photography. We used social psychology and linguistic conce...
Eric C. Cook, Stephanie D. Teasley