Sciweavers

10 search results - page 2 / 2
» dim 2009
Sort
View
DIM
2009
ACM
13 years 9 months ago
Using identity credential usage logs to detect anomalous service accesses
For e-commerce companies providing online services, fraudulent access resulting from theft of identity credentials is a serious concern. Such online service providers deploy a var...
Daisuke Mashima, Mustaque Ahamad
DIM
2009
ACM
13 years 11 months ago
Mnikr: reputation construction through human trading of distributed social identities
Reputation forms an important part of how we come to trust people in face-to-face interactions, and thus situations involving trust online have come to realize that reputation is ...
Brendan Francis O'Connor, John Linwood Griffin
DIM
2009
ACM
13 years 11 months ago
Privacy-aware identity management for client-side mashup applications
This paper concerns the problem of identity management in modern Web-2.0-based mashup applications. Identity management supports convenient access to information when mashups are ...
Saman Zarandioon, Danfeng Yao, Vinod Ganapathy
ACCV
2009
Springer
13 years 8 months ago
Image Enhancement of Low-Light Scenes with Near-Infrared Flash Images
Abstract. We present a novel technique for enhancing an image captured in low light by using near-infrared flash images. The main idea is to combine a color image with near-infrar...
Sosuke Matsui, Takahiro Okabe, Mihoko Shimano, Yoi...
CPAIOR
2009
Springer
13 years 11 months ago
Modelling Search Strategies in Rules2CP
In this abstract, we present a rule-based modelling language for constraint programming, called Rules2CP [1], and a library PKML for modelling packing problems. Unlike other modell...
François Fages, Julien Martin