Sciweavers

676 search results - page 120 / 136
» Ubiquitous command and control
Sort
View
ICMCS
2008
IEEE
165views Multimedia» more  ICMCS 2008»
14 years 2 months ago
Hyperacoustic instruments: Computer-controlled instruments that are not electrophones
This paper describes a musical instrument consisting of a physical process that acoustically generates sound from the material world (i.e. sound derived from matter such as solid,...
Steve Mann, Ryan E. Janzen, Raymond Lo
SASO
2008
IEEE
14 years 2 months ago
nuBOINC: BOINC Extensions for Community Cycle Sharing
Currently, cycle sharing over the Internet is a one-way deal. Computer owners only have one role in the process: to donate their computers’ idle time. This is due to the fact th...
João Nuno Silva, Luís Veiga, Paulo F...
IPCCC
2006
IEEE
14 years 1 months ago
Optimising malware
In recent years, malicious software (malware) has become one of the most insidious threats in computer security. However, this is arguably not the result of increased sophisticati...
José M. Fernandez, Pierre-Marc Bureau
NETGAMES
2006
ACM
14 years 1 months ago
Network game design: hints and implications of player interaction
While psychologists analyze network game-playing behavior in terms of players’ social interaction and experience, understanding user behavior is equally important to network res...
Kuan-Ta Chen, Chin-Laung Lei
SIGCOMM
2006
ACM
14 years 1 months ago
Understanding the network-level behavior of spammers
This paper studies the network-level behavior of spammers, including: IP address ranges that send the most spam, common spamming modes (e.g., BGP route hijacking, bots), how persi...
Anirudh Ramachandran, Nick Feamster