Sciweavers

808 search results - page 151 / 162
» Collaborative Networked Communication: MUDs as Systems Tools
Sort
View
INFOCOM
2009
IEEE
14 years 3 months ago
Detecting Spam Zombies by Monitoring Outgoing Messages
—Compromised machines are one of the key security threats on the Internet; they are often used to launch various security attacks such as DDoS, spamming, and identity theft. In t...
Zhenhai Duan, Peng Chen, Fernando Sanchez, Yingfei...
EAAI
2008
113views more  EAAI 2008»
13 years 9 months ago
Airlift mission monitoring and dynamic rescheduling
We describe the Flight Manager Assistant (FMA), a prototype system, designed to support real-time management of airlift operations at the USAF Air Mobility Command (AMC). In curre...
David E. Wilkins, Stephen F. Smith, Laurence A. Kr...
HICSS
1999
IEEE
115views Biometrics» more  HICSS 1999»
14 years 1 months ago
Focusing on Mobility
In this paper, we motivate the importance of the field of mobile computing and survey current practical and formal approaches. We argue that the existing formalisms are not suffic...
Klaus Bergner, Radu Grosu, Andreas Rausch, Alexand...
COCOON
2009
Springer
14 years 3 months ago
On the Performances of Nash Equilibria in Isolation Games
: Network games play a fundamental role in understanding behavior in many domains, ranging from communication networks through markets to social networks. Such networks are used, a...
Vittorio Bilò, Michele Flammini, Gianpiero ...
TSP
2010
13 years 3 months ago
Statistics of Co-Channel Interference in a Field of Poisson and Poisson-Poisson Clustered Interferers
Abstract--With increasing spatial reuse of radio spectrum, cochannel interference is becoming a dominant noise source and may severely degrade the communication performance of wire...
Kapil Gulati, Brian L. Evans, Jeffrey G. Andrews, ...