Sciweavers

209 search results - page 8 / 42
» Establishing Persistent Identity using the Handle System
Sort
View
77
Voted
CANDC
2009
ACM
15 years 1 months ago
Computational and cognitive infrastructures of stigma: empowering identity in social computing and gaming
Computing technologies such as games, social networking sites, and virtual environments often reproduce forms of social stigma encountered in everyday real life, as well as introd...
D. Fox Harrell
WISTP
2007
Springer
15 years 3 months ago
A Smart Card Based Distributed Identity Management Infrastructure for Mobile Ad Hoc Networks
The network is becoming more and more versatile because of the variety of the computing resources and the communication technologies that have become available. The mobility of the...
Eve Atallah, Serge Chaumette
FAST
2011
14 years 28 days ago
Capo: Recapitulating Storage for Virtual Desktops
Shared storage underlies most enterprise VM deployments because it is an established technology that administrators are familiar with and because it good job of protecting data. H...
Mohammad Shamma, Dutch T. Meyer, Jake Wires, Maria...
CRV
2007
IEEE
124views Robotics» more  CRV 2007»
15 years 3 months ago
Petri Net-Based Cooperation In Multi-Agent Systems
Abstract— We present a formal framework for robotic cooperation in which we use an extension to Petri nets, known as workflow nets, to establish a protocol among mobile agents b...
Yehia Thabet Kotb, Steven S. Beauchemin, John L. B...
107
Voted
IEEEARES
2006
IEEE
15 years 3 months ago
Identifying Intrusions in Computer Networks with Principal Component Analysis
Most current anomaly Intrusion Detection Systems (IDSs) detect computer network behavior as normal or abnormal but cannot identify the type of attacks. Moreover, most current intr...
Wei Wang, Roberto Battiti