Sciweavers

2821 search results - page 90 / 565
» Tracing a single user
Sort
View
142
Voted
SAC
2000
ACM
15 years 8 months ago
A Mobile Agent Infrastructure for the Mobility Support
The mobility of terminals and users is a crucial issue in the open global system represented by the Internet. Supporting terminal and user mobility requires a middleware infrastru...
Paolo Bellavista, Antonio Corradi, Cesare Stefanel...
101
Voted
SIAMAM
2008
97views more  SIAMAM 2008»
15 years 3 months ago
Convergence of Dual Algorithm with Arbitrary Communication Delays
We study the issue of convergence of user rates and resource prices under a family of rate control schemes called dual algorithms with arbitrary communication delays. We first con...
Richard J. La, Priya Ranjan
111
Voted
CHES
2005
Springer
108views Cryptology» more  CHES 2005»
15 years 9 months ago
Further Hidden Markov Model Cryptanalysis
We extend the model of Karlof and Wagner for modelling side channel attacks via Input Driven Hidden Markov Models (IDHMM) to the case where not every state corresponds to a single ...
P. J. Green, Richard Noad, Nigel P. Smart
235
Voted
ICDE
2000
IEEE
174views Database» more  ICDE 2000»
16 years 5 months ago
Self-Adaptive User Profiles for Large-Scale Data Delivery
Push-based data delivery requires knowledge of user interests for making scheduling, bandwidthallocation, and routing decisions. Such information is maintained as user profiles. W...
C. Lee Giles, Michael J. Franklin, Ugur Çet...
130
Voted
USS
2010
15 years 1 months ago
Making Linux Protection Mechanisms Egalitarian with UserFS
UserFS provides egalitarian OS protection mechanisms in Linux. UserFS allows any user--not just the system administrator--to allocate Unix user IDs, to use chroot, and to set up f...
Taesoo Kim, Nickolai Zeldovich