Sciweavers

4085 search results - page 576 / 817
» Data Services - From Data to Containers
Sort
View
PERCOM
2010
ACM
15 years 8 months ago
A comparative study of DECT and WLAN signals for indoor localization
—While there is more to context than location, localization and positioning must continue to be improved. Location-aware applications, such as Google Latitude, are enjoying great...
Matthias Kranz, Carl Fischer, Albrecht Schmidt
SOUPS
2010
ACM
15 years 8 months ago
Encountering stronger password requirements: user attitudes and behaviors
Text-based passwords are still the most commonly used authentication mechanism in information systems. We took advantage of a unique opportunity presented by a significant change...
Richard Shay, Saranga Komanduri, Patrick Gage Kell...
ACMICEC
2008
ACM
222views ECommerce» more  ACMICEC 2008»
15 years 6 months ago
A seller's perspective characterization methodology for online auctions
Online auction services have reached great popularity and revenue over the last years. A key component for this success is the seller. Few studies proposed analyzing how the selle...
Arlei Silva, Pedro Calais, Adriano M. Pereira, Fer...
126
Voted
DIMVA
2007
15 years 5 months ago
A Study of Malcode-Bearing Documents
By exploiting the object-oriented dynamic composability of modern document applications and formats, malcode hidden in otherwise inconspicuous documents can reach third-party appli...
Wei-Jen Li, Salvatore J. Stolfo, Angelos Stavrou, ...
NSDI
2010
15 years 5 months ago
Prophecy: Using History for High-Throughput Fault Tolerance
Byzantine fault-tolerant (BFT) replication has enjoyed a series of performance improvements, but remains costly due to its replicated work. We eliminate this cost for read-mostly ...
Siddhartha Sen, Wyatt Lloyd, Michael J. Freedman