Sciweavers

104 search results - page 13 / 21
» Who killed the directed model
Sort
View
CCS
2007
ACM
14 years 27 days ago
Denial of service or denial of security?
We consider the effect attackers who disrupt anonymous communications have on the security of traditional high- and low-latency anonymous communication systems, as well as on the...
Nikita Borisov, George Danezis, Prateek Mittal, Pa...
MM
2006
ACM
153views Multimedia» more  MM 2006»
14 years 20 days ago
Buzz: telling compelling stories
This paper describes a digital theater installation called Buzz. Buzz consists of virtual actors who express the collective voice generated by weblogs (blogs). These actors find ...
Sara Owsley, Kristian J. Hammond, David A. Shamma,...
IPTPS
2004
Springer
14 years 2 days ago
Uncoordinated Load Balancing and Congestion Games in P2P Systems
In P2P systems, users often have many choices of peers from whom to download their data. Each user cares primarily about its own response time, which depends on how many other use...
Subhash Suri, Csaba D. Tóth, Yunhong Zhou
POS
1998
Springer
13 years 11 months ago
DynamO: Dynamic Objects with Persistent Storage
In light of advances in processor and networking technology, especially the emergence of network attached disks, the traditional client-server architecture becomes suboptimal for ...
Jiong Yang, Silvia Nittel, Wei Wang 0010, Richard ...
CIE
2008
Springer
13 years 6 months ago
Designing new interfaces for digital interactive television usable by older adults
The adoption of digital television (DTV) could be particularly attractive for older people if appropriately designed. Despite this, when new services and applicat...
Mark Rice, Norman Alm