Sciweavers

254 search results - page 19 / 51
» Counting with Population Protocols
Sort
View
HICSS
2007
IEEE
109views Biometrics» more  HICSS 2007»
15 years 4 months ago
Personality Matters: Incorporating Detailed User Attributes and Preferences into the Matchmaking Process
Finding ways of reducing undesired behavior in online interactions is at the forefront of the social computing research agenda. One promising way to reduce perceived “bad behavi...
Jens Riegelsberger, Scott Counts, Shelly Farnham, ...
KDD
2004
ACM
170views Data Mining» more  KDD 2004»
15 years 3 months ago
Estimating the size of the telephone universe: a Bayesian Mark-recapture approach
Mark-recapture models have for many years been used to estimate the unknown sizes of animal and bird populations. In this article we adapt a finite mixture mark-recapture model i...
David Poole
ACSAC
2008
IEEE
15 years 5 months ago
A Survey to Guide Group Key Protocol Development
A large number of papers have proposed cryptographic protocols for establishing secure group communication. These protocols allow group members to exchange or establish keys to en...
Ahren Studer, Christina Johns, Jaanus Kase, Kyle O...
WISTP
2007
Springer
15 years 4 months ago
A New Resilient Key Management Protocol for Wireless Sensor Networks
Wireless Sensor Networks (WSN) security is an important issue which has been investigated by researchers for few years. The most fundamental security problem in WSN is key manageme...
Chakib Bekara, Maryline Laurent-Maknavicius
NCA
2003
IEEE
15 years 3 months ago
Scalable Protocol for Content-Based Routing in Overlay Networks
In content networks, messages are routed on the basis of their content and the interests (subscriptions) of the message consumers. This form of routing offers an interesting alte...
Raphaël Chand, Pascal Felber