Sciweavers

129 search results - page 23 / 26
» Strong Accountability for Network Storage
Sort
View
MM
2006
ACM
181views Multimedia» more  MM 2006»
14 years 1 months ago
Peer-to-peer multimedia applications
In both academia and industry, peer-to-peer (P2P) applications have attracted great attention. Peer-to-peer file sharing applications, such as Napster, Gnutella, Kazaa, BitTorrent...
Jin Li
PERCOM
2005
ACM
14 years 7 months ago
Security Parallels between People and Pervasive Devices
Unique and challenging security problems arise due to the scarcity of computational, storage, and power resources in the low-cost pervasive computing environment. Particularly rel...
Stephen A. Weis
EDBTW
2010
Springer
14 years 2 months ago
Key escrow schemes with sliding window for privacy-aware anomaly detection system
Requirements for a traffic monitoring system can be very demanding as both privacy and performance aspects have to be taken into account jointly. Moreover, the legislation sets fo...
Esa Hyytiä, Ivan Gojmerac, Simone Teofili, Gi...
JOCN
2011
123views more  JOCN 2011»
13 years 2 months ago
Neural Correlates of Abstract Verb Processing
orrelates of Abstract Verb Processing Javier Rodríguez-Ferreiro1 , Silvia P. Gennari2 , Robert Davies3 , and Fernando Cuetos4 ■ The present study investigated the neural correl...
Javier Rodríguez-Ferreiro, Silvia P. Gennar...
WWW
2006
ACM
14 years 8 months ago
Selective early request termination for busy internet services
Internet traffic is bursty and network servers are often overloaded with surprising events or abnormal client request patterns. This paper studies a load shedding mechanism called...
Jingyu Zhou, Tao Yang