Sciweavers

1465 search results - page 163 / 293
» Data at work: supporting sharing in science and engineering
Sort
View
EUROSYS
2006
ACM
14 years 6 months ago
Practical taint-based protection using demand emulation
Many software attacks are based on injecting malicious code into a target host. This paper demonstrates the use of a wellknown technique, data tainting, to track data received fro...
Alex Ho, Michael A. Fetterman, Christopher Clark, ...
DAGSTUHL
2006
13 years 10 months ago
Taming Dynamic and Selfish Peers
This paper addresses two important challenges for current P2P systems, namely churn and selfishness. First, we report on a system [19] whose desirable properties (small peer degre...
Stefan Schmid, Fabian Kuhn, Thomas Moscibroda, Rog...
CSCW
2004
ACM
14 years 2 months ago
Instant messages: a framework for reading between the lines
A framework is described for analyzing keystroke level data from instant messages (IM). This is unlike other analyses of IM which employ server-based logs of messages. This framew...
Jeffrey D. Campbell
CSCW
2008
ACM
13 years 11 months ago
The computational geowiki: what, why, and how
Google Maps and its spin-offs are highly successful, but they have a major limitation: users see only pictures of geographic data. These data are inaccessible except by limited ve...
Reid Priedhorsky, Loren G. Terveen
WWW
2004
ACM
14 years 9 months ago
Digital repository interoperability: design, implementation and deployment of the ecl protocol and connecting middleware
This paper describes the design and implementation of the eduSource Communication Layer (ECL) protocol. ECL is one outcome of a pan-Canadian project called eduSource Canada to bui...
Ty Mey Eap, Marek Hatala, Griff Richards