Sciweavers

1906 search results - page 280 / 382
» Dependable Self-Hosting Distributed Systems Using Constraint...
Sort
View
179
Voted
CORR
2011
Springer
196views Education» more  CORR 2011»
14 years 8 months ago
Privacy-Enhanced Reputation-Feedback Methods to Reduce Feedback Extortion in Online Auctions
In this paper, we study methods for improving the utility and privacy of reputation scores for online auctions, such as used in eBay, so as to reduce the effectiveness of feedbac...
Michael T. Goodrich, Florian Kerschbaum
IROS
2006
IEEE
202views Robotics» more  IROS 2006»
15 years 10 months ago
Topological characterization of mobile robot behavior
— We propose to classify the behaviors of a mobile robot thanks to topological methods as an alternative to metric ones. To do so, we adapt an analysis scheme from Physics of non...
Aurélien Hazan, Frédéric Dave...
INFOCOM
2012
IEEE
13 years 7 months ago
CONSEL: Connectivity-based segmentation in large-scale 2D/3D sensor networks
—A cardinal prerequisite for the system design of a sensor network, is to understand the geometric environment where sensor nodes are deployed. The global topology of a largescal...
Hongbo Jiang, Tianlong Yu, Chen Tian, Guang Tan, C...
148
Voted
CCS
2007
ACM
15 years 10 months ago
Managing RBAC states with transitive relations
In this paper, we study the maintenance of role-based access control (RBAC) models in database environments using transitive closure relations. In particular, the algorithms that ...
Chaoyi Pang, David P. Hansen, Anthony J. Maeder
153
Voted
TREC
2007
15 years 5 months ago
Question Answering with LCC's CHAUCER-2 at TREC 2007
In TREC 2007, Language Computer Corporation explored how a new, semantically-rich framework for information retrieval could be used to boost the overall performance of the answer ...
Andrew Hickl, Kirk Roberts, Bryan Rink, Jeremy Ben...