Sciweavers

1610 search results - page 216 / 322
» Identity Based Multisignatures
Sort
View
DIALM
2005
ACM
203views Algorithms» more  DIALM 2005»
15 years 2 months ago
Topological hole detection in wireless sensor networks and its applications
The identification of holes in a wireless sensor network is of primary interest since the breakdown of sensor nodes in a larger area often indicates one of the special events to ...
Stefan Funke
AUSAI
2008
Springer
15 years 2 months ago
Cross-Domain Knowledge Transfer Using Semi-supervised Classification
Traditional text classification algorithms are based on a basic assumption: the training and test data should hold the same distribution. However, this identical distribution assum...
Yi Zhen, Chunping Li
105
Voted
ESWS
2008
Springer
15 years 2 months ago
Why URI Declarations? A Comparison of Architectural Approaches
When a Semantic Web application encounters a new URI in an RDF statement, how should it determine what resource that URI is intended to denote, and learn more about it? Since asser...
David Booth
98
Voted
BIS
2008
114views Business» more  BIS 2008»
15 years 2 months ago
Transforming Exchange-based Job Boards into Lasting Career Communities
Abstract. In this paper, we use a qualitative approach to explore which design aspects an erecruiting platform requires so as to achieve active long-term participation of its users...
Elfi Ettinger, Celeste Wilderom, Rolf Van Dick
87
Voted
ECIS
2001
15 years 2 months ago
The Fundamental Inadequacies of Conventional Public Key Infrastructure
It has been conventional wisdom that, for e-commerce to fulfil its potential, each party to a transaction must be confident about the identity of the others. Digital signature tec...
Roger Clarke