Sciweavers

15379 search results - page 118 / 3076
» Protecting users from
Sort
View
ICMCS
2006
IEEE
115views Multimedia» more  ICMCS 2006»
14 years 1 months ago
Robust Distributed Multi-Point Video Conferencing Over Error-Prone Channels
In this paper, we propose a novel multi-point video conferencing system through error-prone channels, where the aggregation of multiple video streams and resource allocation are p...
Meng Chen, Guan-Ming Su, Min Wu
ITICSE
2004
ACM
14 years 1 months ago
Teaching operating systems administration with user mode linux
User Mode Linux is a virtual machine running on a GNULinux operating system. It is the right choice for teaching operating systems’ administration, as it does not need any dedic...
Renzo Davoli
CCS
2006
ACM
13 years 11 months ago
Application security support in the operating system kernel
Application security is typically coded in the application. In kernelSec, we are investigating mechanisms to implement application security in an operating system kernel. The mech...
Manigandan Radhakrishnan, Jon A. Solworth
IEEEIAS
2008
IEEE
14 years 2 months ago
A Model for the Study of Privacy Issues in Secure Shell Connections
: The Secure Shell (SSH) protocol strives to protect the privacy of its users in several ways. On one hand, the strong encryption and authentication algorithms that it adopts provi...
Maurizio Dusi, Francesco Gringoli, Luca Salgarelli
ITSSA
2006
132views more  ITSSA 2006»
13 years 7 months ago
A Self-Governance Approach to Supporting Privacy Preference-based Content Sharing
: The increase in the creation and sharing of distributed multimedia content has led to the creation of new tools and methods to automatically and manually annotate content to assi...
Patricia Charlton, Jonathan Teh