Sciweavers

2194 search results - page 337 / 439
» Improving HLRTA*( k )
Sort
View
WPES
2003
ACM
15 years 6 months ago
Anonymous credentials with biometrically-enforced non-transferability
We present a model and protocol for anonymous credentials. Rather than using deterrents to ensure non-transferability, our model uses secure hardware with biometric authentication...
Russell Impagliazzo, Sara Miner More
108
Voted
CCS
2009
ACM
15 years 5 months ago
TruWallet: trustworthy and migratable wallet-based web authentication
Identity theft has fostered to a major security problem on the Internet, in particular stealing passwords for web applications through phishing and malware. We present TruWallet, ...
Sebastian Gajek, Hans Löhr, Ahmad-Reza Sadegh...
256
Voted

Publication
137views
16 years 10 months ago
Optimal Flooding Protocol for Routing in Ad-Hoc Networks
Location discovery is a fundamental problem in wireless ad hoc networks. Most of the ad hoc routing protocols use some form of flooding to discover the location and route of a mobi...
Vamsi K. Parachuri, Arjan Durresi, Durga S. Dash, ...
130
Voted

Publication
210views
16 years 10 months ago
Using GIS to Measure the Effect of Overlapping Service Areas on Passenger Boardings at Bus Stops
This study examines the effects of overlapping walking service areas of bus stops on the demand for bus transit. This requires controlling for variation in potential transit demand...
T. J. Kimpel, K. Dueker, A. M. El-Geneidy

Publication
412views
16 years 10 months ago
Analyzing Transit Service Reliability using Detailed Data From Automatic Vehicular Locator Systems
The widespread adoption of automated vehicle location systems (AVL) and automatic passenger counters (APC) in the transit industry has opened new venues in operations and system mo...
A. M. El-Geneidy, J. Horning, K. J. Krizek