Sciweavers

730 search results - page 127 / 146
» Digital libraries' support for the user's 'information journ...
Sort
View
SIGCOMM
2009
ACM
14 years 3 months ago
Impact of IT monoculture on behavioral end host intrusion detection
In this paper, we study the impact of today’s IT policies, defined based upon a monoculture approach, on the performance of endhost anomaly detectors. This approach leads to th...
Dhiman Barman, Jaideep Chandrashekar, Nina Taft, M...
MM
2004
ACM
107views Multimedia» more  MM 2004»
14 years 1 months ago
Time, voice, and joyce
We present a design for recapitulating walks through Dublin's City Centre by characters in James Joyce's Ulysses. Our computationally supported walkers will avail themse...
Andrea Taylor, Brendan Donovan, Zoltan Foley-Fishe...
MDM
2004
Springer
147views Communications» more  MDM 2004»
14 years 1 months ago
Mobile Agents: Can They Assist with Context Awareness?
This position paper argues that the mobile agents paradigm is a useful and important technology enabling pervasive and ubiquitous computing. Context awareness drives adaptability ...
Arkady B. Zaslavsky
IEPOL
2010
130views more  IEPOL 2010»
13 years 5 months ago
Piracy or promotion? The impact of broadband Internet penetration on DVD sales
ABSTRACT Digital computer networks represent a disruptive technology, with the potential to create or destroy economic value in established industries. These opportunities and chal...
Michael D. Smith, Rahul Telang
IDTRUST
2009
ACM
14 years 3 months ago
Usable secure mailing lists with untrusted servers
Mailing lists are a natural technology for supporting messaging in multi-party, cross-domain collaborative tasks. However, whenever sensitive information is exchanged on such list...
Rakeshbabu Bobba, Joe Muggli, Meenal Pant, Jim Bas...