Sciweavers

93
Voted
COMPUTER
2004
87views more  COMPUTER 2004»
15 years 3 months ago
Prioritized Overlay Multicast in Mobile Ad Hoc Environments
Li Xiao, Abhishek P. Patil, Yunhao Liu, Lionel M. ...
83
Voted
COMPUTER
2004
82views more  COMPUTER 2004»
15 years 3 months ago
A Quantitative Study of Firewall Configuration Errors
Avishai Wool
88
Voted
COMPUTER
2004
75views more  COMPUTER 2004»
15 years 3 months ago
Spam and the Social-Technical Gap
Brian Whitworth, Elizabeth Whitworth
92
Voted
COMPUTER
2004
87views more  COMPUTER 2004»
15 years 3 months ago
Wireless Middleware: Glue for the Mobile Infrastructure
Steven J. Vaughan-Nichols
88
Voted
COMPUTER
2004
73views more  COMPUTER 2004»
15 years 3 months ago
New Trends Revive Supercomputing Industry
Steven J. Vaughan-Nichols
87
Voted
COMPUTER
2004
85views more  COMPUTER 2004»
15 years 3 months ago
Magic Boxes and Boots: Security in Hardware
Sean W. Smith
101
Voted
COMPUTER
2004
55views more  COMPUTER 2004»
15 years 3 months ago
Imperceptible Sensory Channels
Joshua R. Smith
110
Voted
COMPUTER
2004
92views more  COMPUTER 2004»
15 years 3 months ago
Do Agile Methods Marginalize Problem Solvers?
Victor J. Skowronski
80
Voted
COMPUTER
2004
80views more  COMPUTER 2004»
15 years 3 months ago
Hacking the Business Climate for Network Security
Bruce Schneier
95
Voted
COMPUTER
2004
80views more  COMPUTER 2004»
15 years 3 months ago
User-Centered Location Awareness
Chris Schmandt, Natalia Marmasse