Sciweavers

680 search results - page 2 / 136
» Locating Hidden Servers
Sort
View
NDSS
2006
IEEE
13 years 12 months ago
Trust Negotiation with Hidden Credentials, Hidden Policies, and Policy Cycles
In an open environment such as the Internet, the decision to collaborate with a stranger (e.g., by granting access to a resource) is often based on the characteristics (rather tha...
Keith B. Frikken, Jiangtao Li, Mikhail J. Atallah
TMC
2008
83views more  TMC 2008»
13 years 5 months ago
Secure Location Verification with Hidden and Mobile Base Stations
In this work, we propose and analyse a new approach for securing localization and location verification in wireless networks based on hidden and mobile base stations. Our approach ...
Srdjan Capkun, Kasper Bonne Rasmussen, Mario Cagal...
ICDAR
2009
IEEE
14 years 21 days ago
Learning Rich Hidden Markov Models in Document Analysis: Table Location
Hidden Markov Models (HMM) are probabilistic graphical models for interdependent classification. In this paper we experiment with different ways of combining the components of an ...
Ana Costa e Silva
AAAI
2008
13 years 8 months ago
The Hidden Permutation Model and Location-Based Activity Recognition
Hung Hai Bui, Dinh Q. Phung, Svetha Venkatesh, Hai...
P2P
2008
IEEE
14 years 10 days ago
Incentives Against Hidden Action in QoS Overlays
Peer-to-peer networks providing QoS-enabled services are sensitive to hidden action situations, where the actions of a server peer are hidden from the peers who receive services f...
Raul Landa, Miguel Rio, David Griffin, Richard G. ...