Sciweavers

87 search results - page 10 / 18
» Networks without Borders: Communication despite Disconnectio...
Sort
View
EUROSYS
2008
ACM
14 years 5 months ago
Eudaemon: involuntary and on-demand emulation against zero-day exploits
Eudaemon is a technique that aims to blur the borders between protected and unprotected applications, and brings together honeypot technology and end-user intrusion detection and ...
Georgios Portokalidis, Herbert Bos
ECIS
2003
13 years 10 months ago
Emerging organisations: metateams in major IT projects
During the last decade, teams working on information technology (IT) development and implementation projects have experienced significant transformations. Nowadays, many members o...
Walter D. Fernández, Alan Underwood
SIGCOMM
2010
ACM
13 years 8 months ago
An analysis of social network-based Sybil defenses
Recently, there has been much excitement in the research community over using social networks to mitigate multiple identity, or Sybil, attacks. A number of schemes have been propo...
Bimal Viswanath, Ansley Post, P. Krishna Gummadi, ...
ISM
2005
IEEE
99views Multimedia» more  ISM 2005»
14 years 2 months ago
Video Broadcasting using Overlay Multicast
Despite the availability of high bandwidth Internet access for end-users, video broadcasting over the Internet is not widely spread. Multicast communication decreases the network ...
Dragan Milic, Marc Brogle, Torsten Braun
JSW
2008
196views more  JSW 2008»
13 years 8 months ago
Providing Data Items with Time Constraints in Multi-Channel Broadcasting Environments
In a mobile computing system, users carrying portable devices can access database services from any location without requiring a fixed position in the networking environment. Some ...
Ding-Jung Chiang, Hwei-Jen Lin, Timothy K. Shih