Sciweavers

101 search results - page 15 / 21
» Ethnography considered harmful
Sort
View
INFOCOM
2008
IEEE
14 years 1 months ago
Information Concealing Games
— Consider the situation in which a decision maker (Actor) has to decide which of several available resources to use in the presence of an adversary (called Controller) that can ...
Saswati Sarkar, Eitan Altman, Rachid El Azouzi, Ye...
HICSS
2007
IEEE
123views Biometrics» more  HICSS 2007»
14 years 1 months ago
Adaptive Systems Require Adaptive Support--When Tools Attack!
In a world where intelligence can be arguably measured by an animal’s ability to use tools, are we marking ourselves for natural selection? Software development tools are steadi...
Jennifer Baldwin, Yvonne Coady
CLUSTER
2005
IEEE
14 years 1 months ago
A Generic Proxy Mechanism for Secure Middlebox Traversal
Firewalls/NATs have brought significant connectivity problems along with their benefits, causing many applications to break or become inefficient. Due to its bi-directional commun...
Se-Chang Son, Matthew Farrellee, Miron Livny
ISCC
2005
IEEE
14 years 29 days ago
Degree-Optimal Deterministic Routing for P2P Systems
We propose routing schemes that optimize the average number of hops for lookup requests in Peer–to–Peer (P2P) systems without adding any overhead to the system. Our work is in...
Gennaro Cordasco, Luisa Gargano, Mikael Hammar, Vi...
AIRWEB
2007
Springer
13 years 11 months ago
Measuring Similarity to Detect Qualified Links
The early success of link-based ranking algorithms was predicated on the assumption that links imply merit of the target pages. However, today many links exist for purposes other ...
Xiaoguang Qi, Lan Nie, Brian D. Davison