Sciweavers

1018 search results - page 145 / 204
» Remote User Authentication Using Public Information
Sort
View
CCS
2005
ACM
14 years 1 months ago
Countering DoS attacks with stateless multipath overlays
Indirection-based overlay networks (IONs) are a promising approach for countering distributed denial of service (DDoS) attacks. Such mechanisms are based on the assumption that at...
Angelos Stavrou, Angelos D. Keromytis
CSCW
2012
ACM
12 years 3 months ago
Investigating effects of visual and tactile feedback on spatial coordination in collaborative handheld systems
Mobile and handheld devices have become platforms to support remote collaboration. But, their small form-factor may impact the effectiveness of the visual feedback channel often u...
Koji Yatani, Darren Gergle, Khai N. Truong
MOBISYS
2007
ACM
14 years 7 months ago
Preserving location privacy in wireless lans
The broadcast and tetherless nature of wireless networks and the widespread deployment of Wi-Fi hotspots makes it easy to remotely locate a user by observing her wireless signals....
Tao Jiang, Helen J. Wang, Yih-Chun Hu
KDD
2005
ACM
124views Data Mining» more  KDD 2005»
14 years 8 months ago
Scalable discovery of hidden emails from large folders
The popularity of email has triggered researchers to look for ways to help users better organize the enormous amount of information stored in their email folders. One challenge th...
Giuseppe Carenini, Raymond T. Ng, Xiaodong Zhou
ELPUB
2000
ACM
14 years 8 days ago
Multimedia Cd-Rom as a Medium for Manuscript Preservation and Dissemination: The Design and Development of "Treasures of Islam"
The paper discusses the use of electronic publishing for the preservation and dissemination of rare manuscript material. It is based both upon the authors’ earlier work on multi...
Andrew Large, Jamshid Beheshti, Haidar Moukdad