Sciweavers

1363 search results - page 215 / 273
» Distributed Authorization with Distributed Grammars
Sort
View
104
Voted
DIMVA
2008
15 years 2 months ago
VeriKey: A Dynamic Certificate Verification System for Public Key Exchanges
Abstract. This paper presents a novel framework to substantiate selfsigned certificates in the absence of a trusted certificate authority. In particular, we aim to address the prob...
Brett Stone-Gross, David Sigal, Rob Cohn, John Mor...
CMS
2003
171views Communications» more  CMS 2003»
15 years 1 months ago
Securing the Border Gateway Protocol: A Status Update
The Border Gateway Protocol (BGP) is a critical component of the Internet routing infrastructure, used to distribute routing information between autonomous systems (ASes). It is hi...
Stephen T. Kent
96
Voted
TREC
2004
15 years 1 months ago
Amberfish at the TREC 2004 Terabyte Track
The TREC 2004 Terabyte Track evaluated information retrieval in largescale text collections, using a set of 25 million documents (426 GB). This paper gives an overview of our expe...
Nassib Nassar
HUC
2010
Springer
15 years 1 months ago
Ubiquitous computing for sustainable energy (UCSE2010)
Providing sustainable energy is one of the fundamental challenges for mankind. With energy usage being a part of everyday activities and with the increasingly diversity of energy ...
Albrecht Schmidt, Adrian Friday, Hans-Werner Gelle...
99
Voted
CORR
2010
Springer
122views Education» more  CORR 2010»
15 years 20 days ago
Harvesting Collective Intelligence: Temporal Behavior in Yahoo Answers
When harvesting collective intelligence, a user wishes to maximize the accuracy and value of the acquired information without spending too much time collecting it. We empirically ...
Christina Aperjis, Bernardo A. Huberman, Fang Wu