Sciweavers

169 search results - page 15 / 34
» Malicious interface design: exploiting the user
Sort
View
CN
2008
126views more  CN 2008»
13 years 7 months ago
Design and evaluation of flow handoff signalling for multihomed mobile nodes in wireless overlay networks
With the increasing deployment of wireless overlay networks, a mobile node with a range of network interfaces can be connected to multiple heterogeneous or homogeneous access netw...
Qi Wang, Robert Atkinson, John Dunlop
SIGIR
2002
ACM
13 years 7 months ago
Detecting and Browsing Events in Unstructured text
Previews and overviews of large, heterogeneous information resources help users comprehend the scope of collections and focus on particular subsets of interest. For narrative docu...
David A. Smith
CCS
2011
ACM
12 years 7 months ago
AmazonIA: when elasticity snaps back
Cloud Computing is an emerging technology promising new business opportunities and easy deployment of web services. Much has been written about the risks and benefits of cloud co...
Sven Bugiel, Stefan Nürnberger, Thomas Pö...
IPPS
2002
IEEE
14 years 16 days ago
Can User-Level Protocols Take Advantage of Multi-CPU NICs?
Modern high speed interconnects such as Myrinet and Gigabit Ethernet have shifted the bottleneck in communication from the interconnect to the messaging software at the sending an...
Piyush Shivam, Pete Wyckoff, Dhabaleswar K. Panda
IPPS
2007
IEEE
14 years 1 months ago
High-Performance Multi-Rail Support with the NEWMADELEINE Communication Library
This paper focuses on message transfers across multiple heterogeneous high-performance networks in the NEWMADELEINE Communication Library. NEWMADELEINE features a modular design t...
Olivier Aumage, Elisabeth Brunet, Guillaume Mercie...