Sciweavers

1161 search results - page 98 / 233
» Group Message Authentication
Sort
View
ACL
2010
14 years 10 months ago
Finding Cognate Groups Using Phylogenies
A central problem in historical linguistics is the identification of historically related cognate words. We present a generative phylogenetic model for automatically inducing cogn...
David Hall, Dan Klein
HICSS
2008
IEEE
98views Biometrics» more  HICSS 2008»
15 years 7 months ago
Cues to Deception in Online Chinese Groups
Advancing our knowledge about cues to deception is crucial to successful deception detection. A lengthy list of cues to deception has been identified via a myriad of deception stu...
Lina Zhou, Yu-wei Sung
109
Voted
COMCOM
1998
98views more  COMCOM 1998»
15 years 15 days ago
IP multicast group management for point-to-point local distribution
—We examine the applicability of existing IP multicast mechanisms for Point-to-Point links such as wired and wireless telephone lines. We identify problems such as overhead due t...
George Xylomenos, George C. Polyzos
WS
2003
ACM
15 years 6 months ago
An authentication framework for hierarchical ad hoc sensor networks
Recent results indicate scalability problems for flat ad hoc networks. To address the issue of scalability, self-organizing hierarchical ad hoc architectures are being investigat...
Mathias Bohge, Wade Trappe
101
Voted
CLEIEJ
2008
88views more  CLEIEJ 2008»
15 years 27 days ago
A Trust Model for a Group of E-mail Servers
E-mail services are essential in the Internet. However, the current e-mail architecture presents problems that open it to several threats. Alternatives have been proposed to solve...
Leonardo de Oliveira, Carlos Maziero