Sciweavers

42 search results - page 8 / 9
» PoX: Protecting users from malicious Facebook applications
Sort
View
ACSAC
2010
IEEE
13 years 5 months ago
Who is tweeting on Twitter: human, bot, or cyborg?
Twitter is a new web application playing dual roles of online social networking and micro-blogging. Users communicate with each other by publishing text-based posts. The popularit...
Zi Chu, Steven Gianvecchio, Haining Wang, Sushil J...
IMSCCS
2006
IEEE
14 years 1 months ago
Collaborative Peer-to-Peer Service for Information Sharing Using JXTA
Peer-to-Peer (P2P) file sharing networks attract much attention from legal and research communities. The success and popularity of P2P networks provides a new paradigm for sharing...
Hao Shi, Yanchun Zhang, Jingyuan Zhang, Elizabeth ...
WWW
2005
ACM
14 years 8 months ago
WebPod: persistent Web browsing sessions with pocketable storage devices
We present WebPod, a portable system that enables mobile users to use the same persistent, personalized web browsing session on any Internet-enabled device. No matter what compute...
Shaya Potter, Jason Nieh
CCS
2004
ACM
14 years 1 months ago
On achieving software diversity for improved network security using distributed coloring algorithms
It is widely believed that diversity in operating systems, software packages, and hardware platforms will decrease the virulence of worms and the effectiveness of repeated applic...
Adam J. O'Donnell, Harish Sethu
CORR
2010
Springer
94views Education» more  CORR 2010»
13 years 7 months ago
Is Content Publishing in BitTorrent Altruistic or Profit-Driven
BitTorrent is the most popular P2P content delivery application where individual users share various type of content with tens of thousands of other users. The growing popularity ...
Rubén Cuevas Rumín, Michal Kryczka, ...