Sciweavers

17932 search results - page 3445 / 3587
» Wireless communications systems
Sort
View
SIGCOMM
2006
ACM
14 years 4 months ago
Detecting evasion attacks at high speeds without reassembly
Ptacek and Newsham [14] showed how to evade signature detection at Intrusion Prevention Systems (IPS) using TCP and IP Fragmentation. These attacks are implemented in tools like F...
George Varghese, J. Andrew Fingerhut, Flavio Bonom...
VRML
2006
ACM
14 years 4 months ago
A case for 3D streaming on peer-to-peer networks
One of the most serious issues holding back the widespread of 3D contents on Internet has been their inaccessibility due to large data volume. Many compression and progressive tra...
Shun-Yun Hu
WPES
2006
ACM
14 years 4 months ago
Nonesuch: a mix network with sender unobservability
Oblivious submission to anonymity systems is a process by which a message may be submitted in such a way that neither the anonymity network nor a global passive adversary may dete...
Thomas S. Heydt-Benjamin, Andrei Serjantov, Beness...
GROUP
2005
ACM
14 years 4 months ago
Proactive support for the organization of shared workspaces using activity patterns and content analysis
Shared workspace systems provide virtual places for selforganized and semi-structured cooperation between local and distributed team members. These cooperation systems have been a...
Wolfgang Prinz, Baber Zaman
KCAP
2005
ACM
14 years 4 months ago
Automated story capture from conversational speech
While storytelling has long been recognized as an important part of effective knowledge management in organizations, knowledge management technologies have generally not distingui...
Andrew S. Gordon, Kavita Ganesan
« Prev « First page 3445 / 3587 Last » Next »