Sciweavers

7992 search results - page 1582 / 1599
» Communication Abstractions for Distributed Systems
Sort
View
157
Voted
TDSC
2010
218views more  TDSC 2010»
15 years 1 months ago
Secure Data Objects Replication in Data Grid
—Secret sharing and erasure coding-based approaches have been used in distributed storage systems to ensure the confidentiality, integrity, and availability of critical informati...
Manghui Tu, Peng Li, I-Ling Yen, Bhavani M. Thurai...
171
Voted
IMC
2010
ACM
15 years 20 days ago
Listen to me if you can: tracking user experience of mobile network on social media
Social media sites such as Twitter continue to grow at a fast pace. People of all generations use social media to exchange messages and share experiences of their life in a timely...
Tongqing Qiu, Junlan Feng, Zihui Ge, Jia Wang, Jun...
131
Voted
IMC
2010
ACM
15 years 20 days ago
Measurement of loss pairs in network paths
Loss-pair measurement was proposed a decade ago for discovering network path properties, such as a router's buffer size. A packet pair is regarded as a loss pair if exactly o...
Edmond W. W. Chan, Xiapu Luo, Weichao Li, Waiting ...
137
Voted
TMA
2010
Springer
150views Management» more  TMA 2010»
15 years 18 days ago
A Database of Anomalous Traffic for Assessing Profile Based IDS
This paper aims at proposing a methodology for evaluating current IDS capabilities of detecting attacks targeting the networks and their services. This methodology tries to be as r...
Philippe Owezarski
131
Voted
CANDC
2009
ACM
15 years 17 days ago
A tale of two online communities: fostering collaboration and creativity in scientists and children
There has been much recent interest in the development of tools to foster remote collaboration and shared creative work. An open question is: what are the guidelines for this proc...
Cecilia R. Aragon, Sarah S. Poon, Andrés Mo...
« Prev « First page 1582 / 1599 Last » Next »