Sciweavers

2338 search results - page 358 / 468
» Community computing and the computing community
Sort
View
ICNP
2003
IEEE
15 years 8 months ago
On the Utility of Distributed Cryptography in P2P and MANETs: The Case of Membership Control
Peer-to-peer systems enable efficient resource aggregation and are inherently scalable since they do not depend on any centralized authority. However, lack of a centralized autho...
Maithili Narasimha, Gene Tsudik, Jeong Hyun Yi
ISSRE
2003
IEEE
15 years 8 months ago
Exploiting Symmetries to Test Programs
Symmetries often appear as properties of many artifical settings. In Program Testing, they can be viewed as properties of programs and can be given by the tester to check the cor...
Arnaud Gotlieb
128
Voted
DIGITALCITIES
2003
Springer
15 years 8 months ago
Visualizing Social Patterns in Virtual Environments on a Local and Global Scale
Today a wide variety of virtual worlds, cities, gaming environments etc. exist and become part of life of their human inhabitants. However, our understanding on how technology infl...
Katy Börner, Shashikant Penumarthy, Bonnie Je...
FGR
2002
IEEE
161views Biometrics» more  FGR 2002»
15 years 8 months ago
Baseline Results for the Challenge Problem of Human ID Using Gait Analysis
Identification of people from gait captured on video has become a challenge problem in computer vision. However, there is not a baseline algorithm or standard dataset for measuri...
P. Jonathon Phillips, Patrick Grother, Sudeep Sark...
ICSM
2002
IEEE
15 years 8 months ago
Two Controlled Experiments Concerning the Usefulness of Assertions as a Means for Programming
Assertions, or more generally “Programming by contract”, have gained widespread acceptance in the computer science community as a means for correct program development. Howeve...
Matthias M. Müller, Rainer Typke, Oliver Hagn...