Sciweavers

3937 search results - page 620 / 788
» Questioning Ubiquitous Computing
Sort
View
CONEXT
2010
ACM
13 years 7 months ago
Profiling-By-Association: a resilient traffic profiling solution for the internet backbone
Profiling Internet backbone traffic is becoming an increasingly hard problem since users and applications are avoiding detection using traffic obfuscation and encryption. The key ...
Marios Iliofotou, Brian Gallagher, Tina Eliassi-Ra...
FLAIRS
2010
13 years 7 months ago
Game Based Training for Fighter Pilots
How could computer games be used to augment training for fighter pilots? This paper is aimed at providing one answer to this research question. Three current methods of training f...
Jeremy Ludwig, Robert Richards, Jeff Lovelace
FOCS
2010
IEEE
13 years 7 months ago
On the Insecurity of Parallel Repetition for Leakage Resilience
A fundamental question in leakage-resilient cryptography is: can leakage resilience always be amplified by parallel repetition? It is natural to expect that if we have a leakage-r...
Allison B. Lewko, Brent Waters
GROUP
2010
ACM
13 years 7 months ago
Why it works (when it works): success factors in online creative collaboration
Online creative collaboration (peer production) has enabled the creation of Wikipedia and open source software (OSS), and is rapidly expanding to encompass new domains, such as vi...
Kurt Luther, Kelly E. Caine, Kevin Ziegler, Amy Br...
ICDM
2010
IEEE
105views Data Mining» more  ICDM 2010»
13 years 7 months ago
On the Vulnerability of Large Graphs
Given a large graph, like a computer network, which k nodes should we immunize (or monitor, or remove), to make it as robust as possible against a computer virus attack? We need (...
Hanghang Tong, B. Aditya Prakash, Charalampos E. T...