Sciweavers

4962 search results - page 935 / 993
» Connectivity in Sub-Poisson Networks
Sort
View
135
Voted
EPEW
2008
Springer
15 years 7 months ago
Evaluation of P2P Algorithms for Probabilistic Trust Inference in a Web of Trust
The problem of finding trust paths and estimating the trust one can place in a partner arises in various application areas, including virtual organisations, authentication systems ...
Huqiu Zhang, Aad P. A. van Moorsel
BDA
2007
15 years 6 months ago
A Framework for Distributed Spatial Indexing in Shared-Nothing Architectures
The paper presents a complete framework for spatial indexing support in a distributed setting. We consider a shared-nothing environment where a set of servers provides independent...
Cédric du Mouza, Witold Litwin, Philippe Ri...
ISSA
2008
15 years 6 months ago
A Proof-of-Concept Implementation of EAP-TLS with TPM Support
Many people who have tried to configure their IEEE 802.11 enabled mobile phones to connect to a public wireless hotspot know one of the major differences between IEEE 802.11 netwo...
Carolin Latze, Ulrich Ultes-Nitsche
IJCAI
2007
15 years 6 months ago
Recursive Random Fields
A formula in first-order logic can be viewed as a tree, with a logical connective at each node, and a knowledge base can be viewed as a tree whose root is a conjunction. Markov l...
Daniel Lowd, Pedro Domingos
151
Voted
IJCAI
2007
15 years 6 months ago
A Bayesian Computational Cognitive Model
Computational cognitive modeling has recently emerged as one of the hottest issues in the AI area. Both symbolic approaches and connectionist approaches present their merits and d...
Zhiwei Shi, Hong Hu, Zhongzhi Shi