Sciweavers

93 search results - page 6 / 19
» Sharing Metadata - Problems and Potential Solutions
Sort
View
RAID
2000
Springer
13 years 10 months ago
Transaction-Based Pseudonyms in Audit Data for Privacy Respecting Intrusion Detection
Abstract. Privacy and surveillance by intrusion detection are potentially conflicting organizational and legal requirements. In order to support a balanced solution, audit data is ...
Joachim Biskup, Ulrich Flegel
SIGECOM
2005
ACM
118views ECommerce» more  SIGECOM 2005»
14 years 19 days ago
Content availability, pollution and poisoning in file sharing peer-to-peer networks
Copyright holders have been investigating technological solutions to prevent distribution of copyrighted materials in peer-to-peer file sharing networks. A particularly popular t...
Nicolas Christin, Andreas S. Weigend, John Chuang
ICC
2011
IEEE
202views Communications» more  ICC 2011»
12 years 6 months ago
Outage Probability Analysis for Collocated Spectrum-Sharing Macrocell and Femtocells
—Femtocells have been considered by the wireless industry as a promising solution not only to improve indoor coverage, but also to unload traffic from already overburdened macroc...
Xiaoli Chu, Joyce Y. Wu, Haibo Wang
SAC
2009
ACM
14 years 1 months ago
Where are your manners?: Sharing best community practices in the web 2.0
The Web 2.0 fosters the creation of communities by offering users a wide array of social software tools. While the success of these tools is based on their ability to support diff...
Angelo Di Iorio, Davide Rossi, Fabio Vitali, Stefa...
PE
2006
Springer
130views Optimization» more  PE 2006»
13 years 7 months ago
Analysis of resource transfers in peer-to-peer file sharing applications using fluid models
This paper proposes a stochastic fluid flow model to compute the transfer time distribution of resources in peer-to-peer file sharing applications. The amount of bytes transferred...
Rossano Gaeta, Marco Gribaudo, Daniele Manini, Mat...