Sciweavers

4344 search results - page 729 / 869
» The resourcefulness of everyday design
Sort
View
ADHOC
2007
134views more  ADHOC 2007»
13 years 9 months ago
Threshold password authentication against guessing attacks in Ad hoc networks
Password authentication has been accepted as one of the commonly used solutions in network environment to protect resources from unauthorized access. The emerging mobile Ad hoc ne...
Zhenchuan Chai, Zhenfu Cao, Rongxing Lu
CCR
2000
121views more  CCR 2000»
13 years 9 months ago
mmdump: a tool for monitoring internet multimedia traffic
Internet multimedia traffic is increasing as applications like streaming media and packet telephony grow in popularity. It is important to monitor the volume and characteristics o...
Jacobus E. van der Merwe, Ramón Cáce...
CORR
2002
Springer
93views Education» more  CORR 2002»
13 years 9 months ago
Secure History Preservation Through Timeline Entanglement
A secure timeline is a tamper-evident historic record of the states through which a system goes throughout its operational history. Secure timelines can help us reason about the t...
Petros Maniatis, Mary Baker
CORR
2002
Springer
156views Education» more  CORR 2002»
13 years 9 months ago
MPICH-G2: A Grid-Enabled Implementation of the Message Passing Interface
Application development for distributed-computing ``Grids'' can benefit from tools that variously hide or enable application-level management of critical aspects of the ...
Nicholas T. Karonis, Brian R. Toonen, Ian T. Foste...
CSCW
2002
ACM
13 years 9 months ago
Markets for attention: will postage for email help?
Balancing the needs of information distributors and their audiences has grown harder in the age of the Internet. While the demand for attention continues to increase rapidly with ...
Robert E. Kraut, James Morris, Rahul Telang, Darri...