Sciweavers

464 search results - page 74 / 93
» Authorisation Using Attributes from Multiple Authorities
Sort
View
CSCW
2008
ACM
14 years 11 months ago
The microstructures of social tagging: a rational model
This article presents a rational model developed under the distributed cognition framework that explains how social tags influence knowledge acquisition and adaptation in explorat...
Wai-Tat Fu
73
Voted
NETWORK
2008
106views more  NETWORK 2008»
14 years 9 months ago
Toward internet-wide multipath routing
The Internet would be more efficient and robust if routers could flexibly divide traffic over multiple paths. Often, having one or two extra paths is sufficient for customizing pa...
Jiayue He, Jennifer Rexford
JSCIC
2007
85views more  JSCIC 2007»
14 years 9 months ago
On Boundary Condition Capturing for Multiphase Interfaces
This paper begins with an overview of the boundary condition capturing approach to solving problems with interfaces. Although, the authors’ original motivation was to extend the...
Jeong-Mo Hong, Tamar Shinar, Myungjoo Kang, Ronald...
AND
2010
14 years 7 months ago
A platform for storing, visualizing, and interpreting collections of noisy documents
The goal of document image analysis is to produce interpretations that match those of a uent and knowledgeable human when viewing the same input. Because computer vision technique...
Bart Lamiroy, Daniel P. Lopresti
GLOBECOM
2010
IEEE
14 years 7 months ago
A Distributed Public Key Caching Scheme in Large Wireless Networks
When asymmetric cryptography techniques are used in wireless networks, the public keys of the nodes need to be widely available and signed by a Certificate Authority (CA). However,...
Yuan Kong, Jing Deng, Stephen R. Tate