Sciweavers

562 search results - page 47 / 113
» Secure Multiparty Computation with General Interaction Patte...
Sort
View
MOBIHOC
2003
ACM
16 years 3 months ago
Mobility helps security in ad hoc networks
Contrary to the common belief that mobility makes security more difficult to achieve, we show that node mobility can, in fact, be useful to provide security in ad hoc networks. We...
Jean-Pierre Hubaux, Levente Buttyán, Srdjan...
KDD
2009
ACM
188views Data Mining» more  KDD 2009»
15 years 10 months ago
BGP-lens: patterns and anomalies in internet routing updates
The Border Gateway Protocol (BGP) is one of the fundamental computer communication protocols. Monitoring and mining BGP update messages can directly reveal the health and stabilit...
B. Aditya Prakash, Nicholas Valler, David Andersen...
SOUPS
2009
ACM
15 years 10 months ago
Challenges in supporting end-user privacy and security management with social navigation
Social navigation is a promising approach for supporting privacy and security management. By aggregating and presenting the choices made by others, social navigation systems can p...
Jeremy Goecks, W. Keith Edwards, Elizabeth D. Myna...
CHI
2010
ACM
15 years 11 months ago
A longitudinal study of how highlighting web content change affects people's web interactions
The Web is constantly changing, but most tools used to access Web content deal only with what can be captured at a single instance in time. As a result, Web users may not have a g...
Jaime Teevan, Susan T. Dumais, Daniel J. Liebling
CVPR
2008
IEEE
16 years 6 months ago
Markerless motion capture of man-machine interaction
This work deals with modeling and markerless tracking of athletes interacting with sports gear. In contrast to classical markerless tracking, the interaction with sports gear come...
Bodo Rosenhahn, Christian Schmaltz, Thomas Brox, J...