Sciweavers

1172 search results - page 190 / 235
» Who killed design
Sort
View
MOBILITY
2009
ACM
14 years 2 months ago
A membership management protocol for mobile P2P networks
MANETs are self-organizing networks composed of mobile wireless nodes with often scarce resources. Distributed applications based on the P2P paradigm are by nature good candidates...
Mohamed Karim Sbai, Emna Salhi, Chadi Barakat
ISM
2008
IEEE
163views Multimedia» more  ISM 2008»
14 years 2 months ago
Cocktail Party on the Mobile
We present the architecture, user interface and prototype implementation of Fluid Voice, a proximity based mobile group communication system for opportunistic social exchanges. It...
Kwan Hong Lee, Andrew Lippman, Thiago Santos
SP
2007
IEEE
14 years 2 months ago
The Emperor's New Security Indicators
We evaluate website authentication measures that are designed to protect users from man-in-the-middle, ‘phishing’, and other site forgery attacks. We asked 67 bank customers t...
Stuart E. Schechter, Rachna Dhamija, Andy Ozment, ...
ICS
2007
Tsinghua U.
14 years 1 months ago
Optimization of data prefetch helper threads with path-expression based statistical modeling
This paper investigates helper threads that improve performance by prefetching data on behalf of an application’s main thread. The focus is data prefetch helper threads that lac...
Tor M. Aamodt, Paul Chow
VLDB
2007
ACM
295views Database» more  VLDB 2007»
14 years 1 months ago
From Data Privacy to Location Privacy: Models and Algorithms
This tutorial presents the definition, the models and the techniques of location privacy from the data privacy perspective. By reviewing and revising the state of art research in ...
Ling Liu