Sciweavers

1368 search results - page 235 / 274
» A Hybrid Reputation Model Based on the Use of Organizations
Sort
View
ADHOC
2010
195views more  ADHOC 2010»
14 years 9 months ago
SDRT: A reliable data transport protocol for underwater sensor networks
In this paper, we investigate the reliable data transport problem in underwater sensor networks. Underwater sensor networks are significantly different from terrestrial sensor net...
Peng Xie, Zhong Zhou, Zheng Peng, Jun-Hong Cui, Zh...
WPES
2003
ACM
15 years 2 months ago
Anonymous credentials with biometrically-enforced non-transferability
We present a model and protocol for anonymous credentials. Rather than using deterrents to ensure non-transferability, our model uses secure hardware with biometric authentication...
Russell Impagliazzo, Sara Miner More
149
Voted
SIGMOD
2009
ACM
171views Database» more  SIGMOD 2009»
15 years 10 months ago
Secure outsourced aggregation via one-way chains
We consider the Outsourced Aggregation model, where sensing services outsource their sensor data collection and aggregation tasks to third-party service providers called aggregato...
Suman Nath, Haifeng Yu, Haowen Chan
71
Voted
ACCV
2009
Springer
15 years 4 months ago
From Ramp Discontinuities to Segmentation Tree
Abstract. This paper presents a new algorithm for low-level multiscale segmentation of images. The algorithm is designed to detect image regions regardless of their shapes, sizes, ...
Emre Akbas, Narendra Ahuja
SASO
2007
IEEE
15 years 4 months ago
Leveraging Resource Prediction for Anticipatory Dynamic Configuration
Self-adapting systems based on multiple concurrent applications must decide how to allocate scarce resources to applications and how to set the quality parameters of each applicat...
Vahe Poladian, David Garlan, Mary Shaw, M. Satyana...