Sciweavers

739 search results - page 124 / 148
» Information Flow in Credential Systems
Sort
View

Publication
448views
15 years 6 months ago
Congestion Control using Multilevel Explicit Congestion Notification
Congestion remains one of the main obstacles to the Quality of Service (QoS) on the Internet. We think that a good solution to Internet congestion should optimally combine congesti...
Arjan Durresi, Leonard Barolli, Raj Jain, Makoto T...
WWW
2005
ACM
14 years 8 months ago
Partitioning of Web graphs by community topology
We introduce a stricter Web community definition to overcome boundary ambiguity of a Web community defined by Flake, Lawrence and Giles [2], and consider the problem of finding co...
Hidehiko Ino, Mineichi Kudo, Atsuyoshi Nakamura
CHI
2010
ACM
14 years 2 months ago
ToolClips: an investigation of contextual video assistance for functionality understanding
We investigate the use of on-line contextual video assistance to improve the learnability of software functionality. After discussing motivations and design goals for such forms o...
Tovi Grossman, George W. Fitzmaurice
PLDI
2009
ACM
14 years 2 months ago
Catch me if you can: permissive yet secure error handling
Program errors are a source of information leaks. Tracking these leaks is hard because error propagation breaks out of program structure. Programming languages often feature excep...
Aslan Askarov, Andrei Sabelfeld
SECURWARE
2008
IEEE
14 years 2 months ago
A Body-Centered Cubic Method for Key Agreement in Dynamic Mobile Ad Hoc Networks
Mobile ad hoc networking is an operating mode for rapid mobile host interconnection, where nodes rely on each other, in order to maintain network connectivity and functionality. S...
Ioannis G. Askoxylakis, Damien Sauveron, Constanti...