Sciweavers

548 search results - page 53 / 110
» Secure peer sampling
Sort
View
CCR
2007
168views more  CCR 2007»
15 years 2 months ago
Challenges in peer-to-peer gaming
While multi-player online games are very successful, their fast deployment suffers from their server-based architecture. Indeed, servers both limit the scalability of the games a...
Christoph Neumann, Nicolas Prigent, Matteo Varvell...
ACSAC
2002
IEEE
15 years 7 months ago
A Context-Aware Security Architecture for Emerging Applications
We describe an approach to building security services for context-aware environments. Specifically, we focus on the design of security services that incorporate the use of securi...
Michael J. Covington, Prahlad Fogla, Zhiyuan Zhan,...
114
Voted
NCA
2005
IEEE
15 years 7 months ago
Decentralized Schemes for Size Estimation in Large and Dynamic Groups
Large-scale and dynamically changing distributed systems such as the Grid, peer-to-peer overlays, etc., need to collect several kinds of global statistics in a decentralized manne...
Dionysios Kostoulas, Dimitrios Psaltoulis, Indrani...
98
Voted
CHI
2010
ACM
15 years 8 days ago
Protractor: a fast and accurate gesture recognizer
Protractor is a novel gesture recognizer that can be easily implemented and quickly customized for different users. Protractor uses a nearest neighbor approach, which recognizes a...
Yang Li
DBSEC
2004
97views Database» more  DBSEC 2004»
15 years 3 months ago
Configuring Storage Area Networks for Mandatory Security
Storage-area networks are a popular and efficient way of building large storage systems both in an enterprise environment and for multi-domain storage service providers. In both en...
Benjamin Aziz, Simon N. Foley, John Herbert, Garre...