Sciweavers

495 search results - page 97 / 99
» Modeling the Vulnerability Discovery Process
Sort
View
PPPJ
2006
ACM
14 years 1 months ago
Juxta-Cat: a JXTA-based platform for distributed computing
In this paper we present a JXTA-based platform, called Juxta-CAT, which is an effort to use the JXTA architecture to build a job execution-sharing distributed environment. The Ju...
Joan Esteve Riasol, Fatos Xhafa
NETGAMES
2005
ACM
14 years 1 months ago
Dissecting server-discovery traffic patterns generated by multiplayer first person shooter games
We study the ‘background traffic’ resulting from tens of thousands of networked first person shooter (FPS) clients searching for servers on which to play. Networked, multiplay...
Sebastian Zander, David Kennedy, Grenville J. Armi...
PEWASUN
2004
ACM
14 years 1 months ago
A novel solution for achieving anonymity in wireless ad hoc networks
A mobile ad hoc network consists of mobile nodes that can move freely in an open environment. Communicating nodes in a wireless and mobile ad hoc network usually seek the help of ...
Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry...
ERCIMDL
2009
Springer
177views Education» more  ERCIMDL 2009»
14 years 8 days ago
Curated Databases
Curated databases are databases that are populated and updated with a great deal of human effort. Most reference works that one traditionally found on the reference shelves of li...
Peter Buneman
PERCOM
2010
ACM
13 years 11 months ago
AutoGait: A mobile platform that accurately estimates the distance walked
—AutoGait is a mobile platform that autonomously discovers a user’s walking profile and accurately estimates the distance walked. The discovery is made by utilizing the GPS in...
Dae-Ki Cho, Min Mun, Uichin Lee, Williams J. Kaise...