Sciweavers

5758 search results - page 1137 / 1152
» Anonymity-preserving data collection
Sort
View
INFOCOM
2005
IEEE
14 years 2 months ago
Topology aware overlay networks
— Recently, overlay networks have emerged as a means to enhance end-to-end application performance and availability. Overlay networks attempt to leverage the inherent redundancy ...
Junghee Han, David Watson, Farnam Jahanian
METRICS
2005
IEEE
14 years 2 months ago
Validation of New Theses on Off-the-Shelf Component Based Development
Using OTS (Off-The-Shelf) components in software development has become increasingly popular in the IT industry. OTS components can be either COTS (Commercial-Off-The-Shelf), or O...
Jingyue Li, Reidar Conradi, Odd Petter N. Slyngsta...
SP
2005
IEEE
156views Security Privacy» more  SP 2005»
14 years 2 months ago
Distributed Detection of Node Replication Attacks in Sensor Networks
The low-cost, off-the-shelf hardware components in unshielded sensor-network nodes leave them vulnerable to compromise. With little effort, an adversary may capture nodes, analyze...
Bryan Parno, Adrian Perrig, Virgil D. Gligor
ACMSE
2005
ACM
14 years 2 months ago
The bipartite clique: a topological paradigm for WWWeb user search customization
Web user search customization research has been fueled by the recognition that if the WWW is to attain to its optimal potential as an interactive medium the development of new and...
Brenda F. Miles, Vir V. Phoha
HT
2005
ACM
14 years 2 months ago
From the writable web to global editability
The technical and competence requirements for writing content on the web is still one of the major factors that widens the gap between authors and readers. Although tools that sup...
Angelo Di Iorio, Fabio Vitali
« Prev « First page 1137 / 1152 Last » Next »