Sciweavers

55 search results - page 8 / 11
» Notes On The Design Of An Internet Adversary
Sort
View
IEEESP
2011
12 years 11 months ago
Analysis of a Botnet Takeover
Botnets, networks of malware-infected machines that are controlled by an adversary, are the root cause of a large number of security problems on the Internet. A particularly sophi...
Brett Stone-Gross, Marco Cova, Bob Gilbert, Richar...
HT
2010
ACM
14 years 28 days ago
iMapping: a zooming user interface approach for personal and semantic knowledge management
We present iMapping, a zooming based approach for visually organizing information objects. It was developed on top of semantic desktop technologies and especially targets the supp...
Heiko Haller, Andreas Abecker
HICSS
2002
IEEE
122views Biometrics» more  HICSS 2002»
14 years 24 days ago
Democratic Participation in the Discursive Management of Usenet
Internet voting, sometimes proposed as a means of enhancing democratic participation, is partly inspired by the democratic process of newsgroup creation on Usenet. To better under...
John C. Paolillo, David Heald
CLUSTER
2004
IEEE
13 years 7 months ago
DyRAM: An Active Reliable Multicast Framework for Data Distribution
Group communications (multicast) are foreseen to be one of the most critical yet challenging technologies to meet the exponentially growing demands for data distribution in a large...
Moufida Maimour, CongDuc Pham
CANDC
2009
ACM
14 years 2 months ago
BodyDaemon
This paper introduces the idea of actualizing theory in the context of artistic practice. We describe the project BodyDaemon and its function as a technology-based artwork that is...
Carlos Castellanos, Thecla Schiphorst