Sciweavers

756 search results - page 101 / 152
» Virtual landmarks for the internet
Sort
View
HOTOS
2009
IEEE
14 years 29 days ago
An End to the Middle
The last fifteen years has seen a vast proliferation of middleboxes to solve all manner of persistent limitations in the Internet protocol suite. Examples include firewalls, NATs,...
Colin Dixon, Arvind Krishnamurthy, Thomas E. Ander...
CSCW
2008
ACM
13 years 11 months ago
A hybrid cultural ecology: world of warcraft in China
We analyze online gaming as a site of collaboration in a digital-physical hybrid. We ground our analysis in findings from an ethnographic study of the online game World of Warcraf...
Silvia Lindtner, Bonnie A. Nardi, Yang Wang 0005, ...
COMPSEC
2006
110views more  COMPSEC 2006»
13 years 9 months ago
Uncovering identities: A study into VPN tunnel fingerprinting
Operating System fingerprinting is a reconnaissance method which can be used by attackers or forensic investigators. It identifies a system's identity by observing its respon...
Vafa D. Izadinia, Derrick G. Kourie, Jan H. P. Elo...
CJ
2002
122views more  CJ 2002»
13 years 9 months ago
Java for On-line Distributed Monitoring of Heterogeneous Systems and Services
monitoring indicators at different levels of abstraction. At the application level, it instruments the Java Virtual Machine (JVM) to notify several different types of events trigge...
Paolo Bellavista, Antonio Corradi, Cesare Stefanel...
DSS
2000
82views more  DSS 2000»
13 years 9 months ago
A sales agent for part manufacturers: VMSA
The sales activity of most parts manufacturing companies is based on orders of buyers. The process of promotion, receipt and selection of orders of the parts manufacturers is clos...
Hyung Rim Choi, Hyun Soo Kim, Young Jae Park, Kyou...