Sciweavers

1818 search results - page 329 / 364
» How users use access control
Sort
View
ACNS
2008
Springer
94views Cryptology» more  ACNS 2008»
14 years 3 months ago
Peeking Through the Cloud: DNS-Based Estimation and Its Applications
Reliable network demographics are quickly becoming a much sought-after digital commodity. However, as the need for more refined Internet demographics has grown, so too has the ten...
Moheeb Abu Rajab, Fabian Monrose, Andreas Terzis, ...
WWW
2011
ACM
13 years 4 months ago
Track globally, deliver locally: improving content delivery networks by tracking geographic social cascades
Providers such as YouTube offer easy access to multimedia content to millions, generating high bandwidth and storage demand on the Content Delivery Networks they rely upon. More ...
Salvatore Scellato, Cecilia Mascolo, Mirco Musoles...
PERCOM
2010
ACM
13 years 7 months ago
Sensor.Network: An open data exchange for the web of things
Abstract—Tiny, wireless, sensors embedded in a large number of Internet-capable devices–smart phones, cameras, cars, toys, medical instruments, home appliances and energy meter...
Vipul Gupta, Arshan Poursohi, Poornaprajna Udupi
VTC
2010
IEEE
207views Communications» more  VTC 2010»
13 years 7 months ago
The Design and Implementation of IEEE 802.21 and Its Application on Wireless VoIP
—Supporting a multimode mobile device to seamlessly switch its connections between various wireless access networks, such as WiMAX, Wi-Fi, and LTE, is an important research issue...
Tein-Yaw Chung, Yung-Mu Chen, Pu-Chen Mao, Chen-Ku...
CORR
2011
Springer
217views Education» more  CORR 2011»
13 years 24 days ago
Interactive Execution Monitoring of Agent Teams
There is an increasing need for automated support for humans monitoring the activity of distributed teams of cooperating agents, both human and machine. We characterize the domain...
Pauline Berry, Thomas J. Lee, David E. Wilkins