Sciweavers

15379 search results - page 2934 / 3076
» Protecting users from
Sort
View
136
Voted
DSN
2009
IEEE
15 years 10 months ago
On the effectiveness of low latency anonymous network in the presence of timing attack
In this paper, we introduce a novel metric that can quantitatively measure the practical effectiveness (i.e. anonymity) of all anonymous networks in the presence of timing attack....
Jing Jin, Xinyuan Wang
ETELEMED
2009
IEEE
171views Healthcare» more  ETELEMED 2009»
15 years 10 months ago
Drivers and Challenges of Wireless Solutions in Future Healthcare
What do IT oriented healthcare people think to be most attractive and credible wireless applications in healthcare? What do they think about the challenges? These questions were p...
Esko Alasaarela, Ravi Nemana, Steven DeMello
111
Voted
ICC
2009
IEEE
112views Communications» more  ICC 2009»
15 years 10 months ago
Push Popular Segments in P2P VoD System: Possibility and Design
—Video-on-Demand (VoD) services have attracted a lot of attentions in recent years. Measurement studies show that VCR (Video Cassette Recorder) operations, such as pause, rewind,...
Junfeng Xie, Edward Chan, Guihai Chen, Yang Guo
133
Voted
SP
2009
IEEE
106views Security Privacy» more  SP 2009»
15 years 10 months ago
Pretty-Bad-Proxy: An Overlooked Adversary in Browsers' HTTPS Deployments
– HTTPS is designed to provide secure web communications over insecure networks. The protocol itself has been rigorously designed and evaluated by assuming the network as an adve...
Shuo Chen, Ziqing Mao, Yi-Min Wang, Ming Zhang
VR
2009
IEEE
172views Virtual Reality» more  VR 2009»
15 years 10 months ago
Measurement Protocols for Medium-Field Distance Perception in Large-Screen Immersive Displays
How do users of virtual environments perceive virtual space? Many experiments have explored this question, but most of these have used head-mounted immersive displays. This paper ...
Eric Klein, J. Edward Swan II, Gregory S. Schmidt,...
« Prev « First page 2934 / 3076 Last » Next »