Sciweavers

1502 search results - page 240 / 301
» The new face of war
Sort
View
GIS
2010
ACM
13 years 8 months ago
Geolocation privacy and application platforms
Security and privacy issues for Location-Based Services (LBS) and geolocation-capable applications often revolve around designing a User Interface (UI) such that users are informe...
Nick Doty, Erik Wilde
INFOCOM
2010
IEEE
13 years 8 months ago
Path Stitching: Internet-Wide Path and Delay Estimation from Existing Measurements
Many measurement systems have been proposed in recent years to shed light on the internal performance of the Internet. Their common goal is to allow distributed applications to imp...
D. K. Lee, Keon Jang, Changhyun Lee, Gianluca Iann...
MICAI
2010
Springer
13 years 8 months ago
Towards Document Plagiarism Detection Based on the Relevance and Fragmentation of the Reused Text
Traditionally, External Plagiarism Detection has been carried out by determining and measuring the similar sections between a given pair of documents, known as source and suspiciou...
Fernando Sánchez-Vega, Luis Villaseñ...
MICRO
2010
IEEE
173views Hardware» more  MICRO 2010»
13 years 8 months ago
Single-Chip Heterogeneous Computing: Does the Future Include Custom Logic, FPGAs, and GPGPUs?
To extend the exponential performance scaling of future chip multiprocessors, improving energy efficiency has become a first-class priority. Single-chip heterogeneous computing ha...
Eric S. Chung, Peter A. Milder, James C. Hoe, Ken ...
DSN
2009
IEEE
13 years 7 months ago
RRE: A game-theoretic intrusion Response and Recovery Engine
Preserving the availability and integrity of networked computing systems in the face of fast-spreading intrusions requires advances not only in detection algorithms, but also in a...
Saman A. Zonouz, Himanshu Khurana, William H. Sand...