Sciweavers

328 search results - page 6 / 66
» Identity-Enriched Session Management
Sort
View
WWW
2008
ACM
14 years 8 months ago
Sessionlock: securing web sessions against eavesdropping
Typical web sessions can be hijacked easily by a network eavesdropper in attacks that have come to be designated "sidejacking." The rise of ubiquitous wireless networks,...
Ben Adida
ERCIMDL
2007
Springer
84views Education» more  ERCIMDL 2007»
14 years 1 months ago
VIRGIL - Providing Institutional Access to a Repository of Access Grid Sessions
This paper describes the VIRGIL (Virtual Meeting Archival) system which was developed to provide a simple, practical, easy-to-use method for recording, indexing and archiving large...
Ron Chernich, Jane Hunter, Alex Davies
WINET
2010
176views more  WINET 2010»
13 years 5 months ago
An improved mechanism for multiple MBMS sessions assignment in B3G cellular networks
In Universal Mobile Telecommunication System (UMTS), the downlink capacity is limited by the base station transmission power. Therefore, power control plays an important role to mi...
Antonios G. Alexiou, Christos Bouras, Vasileios Ko...
ICDM
2005
IEEE
133views Data Mining» more  ICDM 2005»
14 years 1 months ago
Panel Session
 The Foundation Coalition and others have been working on the development of Concept Inventory (CI) assessment instruments patterned after the well-known Force Concept Inventory...
IMC
2006
ACM
14 years 1 months ago
Semi-automated discovery of application session structure
While the problem of analyzing network traffic at the granularity of individual connections has seen considerable previous work and tool development, understanding traffic at a ...
Jayanthkumar Kannan, Jaeyeon Jung, Vern Paxson, Ca...