Sciweavers

367 search results - page 57 / 74
» Security Design in Online Games
Sort
View
SIGIR
2010
ACM
13 years 11 months ago
Exploring the use of labels to shortcut search trails
Search trails comprising queries and Web page views are created as searchers engage in information-seeking activity online. During known-item search (where the objective may be to...
Ryen W. White, Raman Chandrasekar
NSDI
2008
13 years 10 months ago
iPhish: Phishing Vulnerabilities on Consumer Electronics
As consumer electronic devices with embedded browsers become popular, financial institutions and online merchants set up websites to accommodate visitors using these devices. Thes...
Yuan Niu, Francis Hsu, Hao Chen
IADIS
2008
13 years 9 months ago
Web 2.0 Technologies For Digital Students
Recent years have seen a new generation of `digital students' emerging in the developed world. Digital students are young adults who have grown up with digital technologies i...
Diana Andone
DASFAA
2008
IEEE
156views Database» more  DASFAA 2008»
13 years 8 months ago
Load Balancing for Moving Object Management in a P2P Network
Abstract. Online games and location-based services now form the potential application domains for the P2P paradigm. In P2P systems, balancing the workload is essential for overall ...
Mohammed Eunus Ali, Egemen Tanin, Rui Zhang, Lars ...
CCR
2008
94views more  CCR 2008»
13 years 8 months ago
ECHOS: edge capacity hosting overlays of nano data centers
In this paper we propose a radical solution to data hosting and delivery for the Internet of the future. The current data delivery architecture is "network centric", wit...
Nikolaos Laoutaris, Pablo Rodriguez, Laurent Masso...