Sciweavers

3937 search results - page 620 / 788
» Questioning Ubiquitous Computing
Sort
View
CONEXT
2010
ACM
15 years 10 days ago
Profiling-By-Association: a resilient traffic profiling solution for the internet backbone
Profiling Internet backbone traffic is becoming an increasingly hard problem since users and applications are avoiding detection using traffic obfuscation and encryption. The key ...
Marios Iliofotou, Brian Gallagher, Tina Eliassi-Ra...
FLAIRS
2010
15 years 10 days ago
Game Based Training for Fighter Pilots
How could computer games be used to augment training for fighter pilots? This paper is aimed at providing one answer to this research question. Three current methods of training f...
Jeremy Ludwig, Robert Richards, Jeff Lovelace
FOCS
2010
IEEE
15 years 10 days ago
On the Insecurity of Parallel Repetition for Leakage Resilience
A fundamental question in leakage-resilient cryptography is: can leakage resilience always be amplified by parallel repetition? It is natural to expect that if we have a leakage-r...
Allison B. Lewko, Brent Waters
GROUP
2010
ACM
15 years 9 days ago
Why it works (when it works): success factors in online creative collaboration
Online creative collaboration (peer production) has enabled the creation of Wikipedia and open source software (OSS), and is rapidly expanding to encompass new domains, such as vi...
Kurt Luther, Kelly E. Caine, Kevin Ziegler, Amy Br...
116
Voted
ICDM
2010
IEEE
105views Data Mining» more  ICDM 2010»
15 years 9 days ago
On the Vulnerability of Large Graphs
Given a large graph, like a computer network, which k nodes should we immunize (or monitor, or remove), to make it as robust as possible against a computer virus attack? We need (...
Hanghang Tong, B. Aditya Prakash, Charalampos E. T...