Sciweavers

255 search results - page 32 / 51
» New Paradigm of Inference Control with Trusted Computing
Sort
View
HOTNETS
2010
13 years 2 months ago
Using strongly typed networking to architect for tussle
Today's networks discriminate towards or against traffic for a wide range of reasons, and in response end users and their applications increasingly attempt to evade monitorin...
Chitra Muthukrishnan, Vern Paxson, Mark Allman, Ad...
ICVS
2001
Springer
14 years 7 hour ago
Adapting Object Recognition across Domains: A Demonstration
High-level vision systems use object, scene or domain specific knowledge to interpret images. Unfortunately, this knowledge has to be acquired for every domain. This makes it diffi...
Bruce A. Draper, Ulrike Ahlrichs, Dietrich Paulus
CHI
2001
ACM
14 years 8 months ago
Scale effects in steering law tasks
Interaction tasks on a computer screen can technically be scaled to a much larger or much smaller sized input control area by adjusting the input device's control gain or the...
Johnny Accot, Shumin Zhai
SIGCOMM
2009
ACM
14 years 2 months ago
Resonance: dynamic access control for enterprise networks
Enterprise network security is typically reactive, and it relies heavily on host security and middleboxes. This approach creates complicated interactions between protocols and sys...
Ankur Kumar Nayak, Alex Reimers, Nick Feamster, Ru...
PERCOM
2007
ACM
14 years 7 months ago
Dynamic Carrier-Assisted Routing in Mobile Networks
We propose to use node mobility to enhance routing capability in a mobile network. A dual-control planes model is presented, which includes the traditional S(stationary)-plane for ...
Jie Wu