Sciweavers

192 search results - page 16 / 39
» Community Identification in Directed Networks
Sort
View
JMLR
2006
113views more  JMLR 2006»
13 years 9 months ago
On Inferring Application Protocol Behaviors in Encrypted Network Traffic
Several fundamental security mechanisms for restricting access to network resources rely on the ability of a reference monitor to inspect the contents of traffic as it traverses t...
Charles V. Wright, Fabian Monrose, Gerald M. Masso...
WIKIS
2009
ACM
14 years 4 months ago
Herding the cats: the influence of groups in coordinating peer production
Peer production systems rely on users to self-select appropriate tasks and “scratch their personal itch”. However, many such systems require significant maintenance work, whic...
Aniket Kittur, Bryan A. Pendleton, Robert E. Kraut
PERCOM
2009
ACM
14 years 10 months ago
P2P over MANET: Indirect Tree-based Routing
Abstract--Mobile Ad hoc NETworks (MANET) and Peer-ToPeer (P2P) systems are emerging technologies sharing a common underlying decentralized networking paradigm. However, the related...
Marcello Caleffi, Luigi Paura
SIGCOMM
2010
ACM
13 years 10 months ago
A framework for low-power IPv6 routing simulation, experimentation, and evaluation
Low-power networked devices, such as sensors and actuators, are becoming a vital part of our everyday infrastructure. Being networked, the continued development of these systems n...
Nicolas Tsiftes, Joakim Eriksson, Niclas Finne, Fr...
EG
2010
119views more  EG 2010»
13 years 7 months ago
Internal factors affecting the adoption and use of government websites
: The purpose of this paper is to identify internal factors within government that affect the adoption and use of government websites. A conceptual framework, based on a literature...
Brian Detlor, Maureen E. Hupfer, Umar Ruhi