Sciweavers

8655 search results - page 1356 / 1731
» Challenges for Trusted Computing
Sort
View
PAAMS
2010
Springer
15 years 8 months ago
Mobile Agents in Vehicular Networks: Taking a First Ride
A vehicular ad hoc network (VANET) is a type of mobile network whose nodes are traveling cars which communicate with one another using short-range wireless communications. These ca...
Oscar Urra, Sergio Ilarri, Thierry Delot, Eduardo ...
CTRSA
2007
Springer
93views Cryptology» more  CTRSA 2007»
15 years 7 months ago
Human Identification Through Image Evaluation Using Secret Predicates
Abstract. The task of developing protocols for humans to securely authenticate themselves to a remote server has been an interesting topic in cryptography as a replacement for the ...
Hassan Jameel, Riaz Ahmed Shaikh, Heejo Lee, Sungy...
145
Voted
WWW
2010
ACM
15 years 7 months ago
Time is of the essence: improving recency ranking using Twitter data
Realtime web search refers to the retrieval of very fresh content which is in high demand. An effective portal web search engine must support a variety of search needs, including ...
Anlei Dong, Ruiqiang Zhang, Pranam Kolari, Jing Ba...
CSFW
2010
IEEE
15 years 7 months ago
Approximation and Randomization for Quantitative Information-Flow Analysis
—Quantitative information-flow analysis (QIF) is an emerging technique for establishing information-theoretic confidentiality properties. Automation of QIF is an important step...
Boris Köpf, Andrey Rybalchenko
137
Voted
ICLP
2010
Springer
15 years 7 months ago
Dedicated Tabling for a Probabilistic Setting
ProbLog is a probabilistic framework that extends Prolog with probabilistic facts. To compute the probability of a query, the complete SLD proof tree of the query is collected as a...
Theofrastos Mantadelis, Gerda Janssens
« Prev « First page 1356 / 1731 Last » Next »