Sciweavers

557 search results - page 54 / 112
» Two experiences designing for effective security
Sort
View
SIGSOFT
2008
ACM
14 years 9 months ago
Empirical evidence of the benefits of workspace awareness in software configuration management
In this paper, we present results from our empirical evaluations of a workspace awareness tool that we designed and implemented to augment the functionality of software configurat...
Anita Sarma, David F. Redmiles, André van d...
INFOCOM
2012
IEEE
11 years 11 months ago
Fine-grained private matching for proximity-based mobile social networking
—Proximity-based mobile social networking (PMSN) refers to the social interaction among physically proximate mobile users directly through the Bluetooth/WiFi interfaces on their ...
Rui Zhang 0007, Yanchao Zhang, Jinyuan Sun, Guanhu...
ICCCN
2008
IEEE
14 years 3 months ago
A Preliminary Look at the Privacy of SSH Tunnels
— Secure Shell (SSH) tunnels are commonly used to provide two types of privacy protection to clear-text application protocols. First and foremost, they aim at protecting the priv...
Maurizio Dusi, Francesco Gringoli, Luca Salgarelli
MIR
2010
ACM
167views Multimedia» more  MIR 2010»
14 years 3 months ago
Improving automatic music classification performance by extracting features from different types of data
This paper discusses two sets of automatic musical genre classification experiments. Promising research directions are then proposed based on the results of these experiments. The...
Cory McKay, Ichiro Fujinaga
TON
1998
93views more  TON 1998»
13 years 8 months ago
An evaluation of flow control in group communication
Abstract— Group communication services have been successfully used to construct applications with high availability, dependability, and real-time responsiveness requirements. Flo...
Shivakant Mishra, Lei Wu