Sciweavers

1117 search results - page 156 / 224
» A Compliance Model of Trust
Sort
View
WOWMOM
2006
ACM
168views Multimedia» more  WOWMOM 2006»
15 years 7 months ago
Modeling Node Compromise Spread in Wireless Sensor Networks Using Epidemic Theory
Motivated by recent surfacing viruses that can spread over the air interfaces, in this paper, we investigate the potential disastrous threat of node compromise spreading in wirele...
Pradip De, Yonghe Liu, Sajal K. Das
108
Voted
CORR
2006
Springer
81views Education» more  CORR 2006»
15 years 1 months ago
The emergence of knowledge exchange: an agent-based model of a software market
Abstract--We investigate knowledge exchange among commercial organizations, the rationale behind it, and its effects on the market. Knowledge exchange is known to be beneficial for...
Maria Chli, Philippe De Wilde
MDAI
2009
Springer
15 years 8 months ago
A Consensus Reaching Model for Web 2.0 Communities
Web 2.0 Communities allow large amounts of users to interact with each others. In fact, new Web 2.0 technologies allow to share resources and information in an easy and timely mann...
Sergio Alonso, Ignacio J. Pérez, Francisco ...
ASIAN
2006
Springer
131views Algorithms» more  ASIAN 2006»
15 years 5 months ago
FORM : A Federated Rights Expression Model for Open DRM Frameworks
Abstract. Digital Rights Management frameworks (DRM) aim at protecting and controlling information contents widely distributed on client devices. Using a license, the content provi...
Thierry Sans, Frédéric Cuppens, Nora...
CIARP
2003
Springer
15 years 7 months ago
Online Handwritten Signature Verification Using Hidden Markov Models
Most people are used to signing documents and because of this, it is a trusted and natural method for user identity verification, reducing the cost of password maintenance and decr...
Juan J. Igarza, Iñaki Goirizelaia, Koldo Es...