Sciweavers

1368 search results - page 247 / 274
» A Hybrid Reputation Model Based on the Use of Organizations
Sort
View
MOBIHOC
2008
ACM
15 years 9 months ago
Bubble rap: social-based forwarding in delay tolerant networks
In this paper we seek to improve our understanding of human mobility in terms of social structures, and to use these structures in the design of forwarding algorithms for Pocket S...
Pan Hui, Jon Crowcroft, Eiko Yoneki
SIBGRAPI
2009
IEEE
15 years 4 months ago
A Multi-linear Discriminant Analysis of 2D Frontal Face Images
We have designed and implemented a multi-linear discriminant method of constructing and quantifying statistically significant changes on human identity photographs. The method is...
Carlos E. Thomaz, Vagner do Amaral, Gilson Antonio...
CANS
2009
Springer
136views Cryptology» more  CANS 2009»
15 years 4 months ago
Verifying Anonymous Credential Systems in Applied Pi Calculus
Abstract. Anonymous credentials are widely used to certify properties of a credential owner or to support the owner to demand valuable services, while hiding the user’s identity ...
Xiangxi Li, Yu Zhang, Yuxin Deng
IISWC
2008
IEEE
15 years 4 months ago
A workload for evaluating deep packet inspection architectures
—High-speed content inspection of network traffic is an important new application area for programmable networking systems, and has recently led to several proposals for high-per...
Michela Becchi, Mark A. Franklin, Patrick Crowley
90
Voted
HICSS
2006
IEEE
141views Biometrics» more  HICSS 2006»
15 years 3 months ago
Infusing an Architectural Framework with Neo-Institutional Theory: Reports from Recent Change Management Initiatives within the
Swedish public administration is currently undergoing radical change towards dynamic models of governance relying on a high level of intergovernmental collaboration. This high lev...
Johan Magnusson, Andreas Nilsson