-
1
-
-
70450281317
-
-
Accessed on 03/26/2009
-
Amazon elastic compute cloud. http://aws.amazon.com/ec2/. Accessed on 03/26/2009.
-
Amazon elastic compute cloud
-
-
-
3
-
-
84869682638
-
-
http://www.ieinspector.com/httpanalyzer
-
Http analyzer. http://www.ieinspector.com/httpanalyzer/.
-
-
-
-
5
-
-
70450247377
-
-
iPass. http://www.ipass.com.
-
iPass. http://www.ipass.com.
-
-
-
-
6
-
-
84869686284
-
-
Jiwire. http://www.jiwire.com.
-
Jiwire
-
-
-
8
-
-
84885573122
-
-
Speedtest.net. http://www.speedtest.net/.
-
Speedtest.net
-
-
-
10
-
-
70450263735
-
-
You can't send secure email from starbuck's (at least not easily). http://staff.washington.edu/oren/blog/2004/04/you-cant-send-s.html.
-
You can't send secure email from starbuck's (at least not easily). http://staff.washington.edu/oren/blog/2004/04/you-cant-send-s.html.
-
-
-
-
11
-
-
84869667266
-
-
Fraud and related activity in connection with access devices. Homeland Security Act 18 U.S.C. §1029, 2002
-
Fraud and related activity in connection with access devices. Homeland Security Act (18 U.S.C. §1029), 2002.
-
-
-
-
13
-
-
34247336855
-
Mobiscopes for human spaces
-
T. Abdelzaher, Y. Anokwa, P. Boda, J. Burke, D. Estrin, L. Guibas, A. Kansal, S. Madden, and J. Reich. Mobiscopes for human spaces. IEEE Pervasive Computing, 6(2):20-29, 2007.
-
(2007)
IEEE Pervasive Computing
, vol.6
, Issue.2
, pp. 20-29
-
-
Abdelzaher, T.1
Anokwa, Y.2
Boda, P.3
Burke, J.4
Estrin, D.5
Guibas, L.6
Kansal, A.7
Madden, S.8
Reich, J.9
-
14
-
-
20844435854
-
Toward the next generation of recommender systems: A survey of the state-of-the-art and possible extensions
-
G. Adomavicius and A. Tuzhilin. Toward the next generation of recommender systems: A survey of the state-of-the-art and possible extensions. IEEE Trans. on Knowl. and Data Eng., 17(6):734-749, 2005.
-
(2005)
IEEE Trans. on Knowl. and Data Eng
, vol.17
, Issue.6
, pp. 734-749
-
-
Adomavicius, G.1
Tuzhilin, A.2
-
15
-
-
35348864333
-
Blind calibration of sensor networks
-
L. Balzano and R. Nowak. Blind calibration of sensor networks. In IPSN, 2007.
-
(2007)
IPSN
-
-
Balzano, L.1
Nowak, R.2
-
16
-
-
20544449100
-
The one-more-rsa-inversion problems and the security of chaum's blind signature scheme
-
M. Bellare, C. Namprempre, D. Pointcheval, and M. Semanko. The one-more-rsa-inversion problems and the security of chaum's blind signature scheme. Journal of Cryptology, 16(3):185-215, 2003.
-
(2003)
Journal of Cryptology
, vol.16
, Issue.3
, pp. 185-215
-
-
Bellare, M.1
Namprempre, C.2
Pointcheval, D.3
Semanko, M.4
-
18
-
-
0036082701
-
Collaborative filtering with privacy
-
J. Canny. Collaborative filtering with privacy. In IEEE Security and Privacy, 2002.
-
(2002)
IEEE Security and Privacy
-
-
Canny, J.1
-
19
-
-
0036993076
-
Collaborative filtering with privacy via factor analysis
-
New York, NY, USA
-
J. Canny. Collaborative filtering with privacy via factor analysis. In SIGIR, New York, NY, USA, 2002.
-
(2002)
SIGIR
-
-
Canny, J.1
-
20
-
-
0001604533
-
Blind signatures for untraceable payments
-
Springer-Verlag
-
D. Chaum. Blind signatures for untraceable payments. In Advances in Cryptology, pages 199-203. Springer-Verlag, 1982.
-
(1982)
Advances in Cryptology
, pp. 199-203
-
-
Chaum, D.1
-
21
-
-
84929273746
-
Untraceable electronic cash
-
D. Chaum, A. Fiat, and M. Naor. Untraceable electronic cash. In CRYPTO, pages 319-327, 1990.
-
(1990)
CRYPTO
, pp. 319-327
-
-
Chaum, D.1
Fiat, A.2
Naor, M.3
-
22
-
-
57349110591
-
Anonysense: Privacy-aware people-centric sensing
-
C. Cornelius, A. Kapadia, D. Kotz, D. Peebles, M. Shin, and N. Triandopoulos. Anonysense: privacy-aware people-centric sensing. In MobiSys, pages 211-224, 2008.
-
(2008)
MobiSys
, pp. 211-224
-
-
Cornelius, C.1
Kapadia, A.2
Kotz, D.3
Peebles, D.4
Shin, M.5
Triandopoulos, N.6
-
24
-
-
78049526178
-
-
Oct. 2005
-
C. Doctorow. Why hotel WiFi sucks. http://www.boingboing.net/2005/10/12/ why-hotel-wifi-sucks.html, Oct. 2005.
-
Why hotel WiFi sucks
-
-
Doctorow, C.1
-
25
-
-
0001292443
-
A practical secret voting scheme for large scale elections
-
A. Fujioka, T. Okamoto, and K. Ohta. A practical secret voting scheme for large scale elections. In ASIACRYPT, 1993.
-
(1993)
ASIACRYPT
-
-
Fujioka, A.1
Okamoto, T.2
Ohta, K.3
-
26
-
-
67650661159
-
Improving wireless privacy with an identifier-free link layer protocol
-
B. Greenstein, D. McCoy, J. Pang, T. Kohno, S. Seshan, and D. Wetherall. Improving wireless privacy with an identifier-free link layer protocol. In MobiSys, 2008.
-
(2008)
MobiSys
-
-
Greenstein, B.1
McCoy, D.2
Pang, J.3
Kohno, T.4
Seshan, S.5
Wetherall, D.6
-
28
-
-
84869682214
-
-
D. Han, A. Agarwala, D. G. Andersen, M. Kaminsky, K. Papagiannaki, and S. Seshan. Mark-and-sweep: getting the "inside" scoop on neighborhood networks. In IMC, 2008.
-
Mark-and-sweep: Getting the "inside" scoop on neighborhood networks
, vol.1097
, pp. 2008
-
-
Han, D.1
Agarwala, A.2
Andersen, D.G.3
Kaminsky, M.4
Papagiannaki, K.5
Seshan, S.6
-
29
-
-
84885732568
-
Using emulation to understand and improve wireless networks and applications
-
G. Judd and P. Steenkiste. Using emulation to understand and improve wireless networks and applications. In NSDI, 2005.
-
(2005)
NSDI
-
-
Judd, G.1
Steenkiste, P.2
-
31
-
-
24944559058
-
Place lab: Device positioning using radio beacons in the wild
-
A. LaMarca, Y. Chawathe, S. Consolvo, J. Hightower, I. Smith, J. Scott, T. Sohn, J. Howard, J. Hughes, F. Potter, J. Tabert, P. Powledge, G. Borriello, and B. Schilit. Place lab: Device positioning using radio beacons in the wild. In Pervasive, 2005.
-
(2005)
Pervasive
-
-
LaMarca, A.1
Chawathe, Y.2
Consolvo, S.3
Hightower, J.4
Smith, I.5
Scott, J.6
Sohn, T.7
Howard, J.8
Hughes, J.9
Potter, F.10
Tabert, J.11
Powledge, P.12
Borriello, G.13
Schilit, B.14
-
32
-
-
33748982833
-
Improved access point selection
-
A. J. Nicholson, Y. Chawathe, M. Y. Chen, B. D. Noble, and D. Wetherall. Improved access point selection. In MobiSys, 2006.
-
(2006)
MobiSys
-
-
Nicholson, A.J.1
Chawathe, Y.2
Chen, M.Y.3
Noble, B.D.4
Wetherall, D.5
-
33
-
-
84866369989
-
Tryst: The case for confidential service discovery
-
J. Pang, B. Greenstein, D. Mccoy, S. Seshan, and D. Wetherall. Tryst: The case for confidential service discovery. In HotNets, 2007.
-
(2007)
HotNets
-
-
Pang, J.1
Greenstein, B.2
Mccoy, D.3
Seshan, S.4
Wetherall, D.5
-
34
-
-
0344152271
-
Bandwidth estimation: Metrics, measurement techniques, and tools
-
R. S. Prasad, M. Murray, C. Dovrolis, and K. Claffy. Bandwidth estimation: Metrics, measurement techniques, and tools. IEEE Network, 17:27-35, 2003.
-
(2003)
IEEE Network
, vol.17
, pp. 27-35
-
-
Prasad, R.S.1
Murray, M.2
Dovrolis, C.3
Claffy, K.4
-
35
-
-
11244331575
-
Reputation-based Wi-Fi deployment protocols and security analysis
-
N. B. Salem, J.-P. Hubaux, and M. Jakobsson. Reputation-based Wi-Fi deployment protocols and security analysis. In WMASH, 2004.
-
(2004)
WMASH
-
-
Salem, N.B.1
Hubaux, J.-P.2
Jakobsson, M.3
-
37
-
-
70450285567
-
-
United States Census Bureau. Table 1: Annual estimates of the population for incorporated places over 100,000. 2007. http://www.census.gov/popest/cities/ tables/SUB-EST2007-01.csv.
-
United States Census Bureau. Table 1: Annual estimates of the population for incorporated places over 100,000. 2007. http://www.census.gov/popest/cities/ tables/SUB-EST2007-01.csv.
-
-
-
-
38
-
-
42149173353
-
-
S. Vasudevan, K. Papagiannaki, C. Diot, J. Kurose, and D. Towsley. Facilitating access point selection in IEEE 802.11 wireless networks. In IMC, 2005.
-
Facilitating access point selection in IEEE 802.11 wireless networks
, vol.1097
, pp. 2005
-
-
Vasudevan, S.1
Papagiannaki, K.2
Diot, C.3
Kurose, J.4
Towsley, D.5
-
39
-
-
55149090014
-
Experience with an object reputation system for peer-to-peer filesharing
-
K. Walsh and E. G. Sirer. Experience with an object reputation system for peer-to-peer filesharing. In NSDI, 2006.
-
(2006)
NSDI
-
-
Walsh, K.1
Sirer, E.G.2
-
41
-
-
70449670722
-
DSybil: Optimal sybil-resistance for recommendation systems
-
H. Yu, C. Shi, M. Kaminsky, P. B. Gibbons, and F. Xiao. DSybil: Optimal sybil-resistance for recommendation systems. In IEEE Security and Privacy, 2009.
-
(2009)
IEEE Security and Privacy
-
-
Yu, H.1
Shi, C.2
Kaminsky, M.3
Gibbons, P.B.4
Xiao, F.5
|