Sciweavers

1625 search results - page 267 / 325
» Intentionality
Sort
View
CCS
2010
ACM
15 years 1 months ago
Adjustable autonomy for cross-domain entitlement decisions
Cross-domain information exchange is a growing problem, as business and governmental organizations increasingly need to integrate their information systems with those of partially...
Jacob Beal, Jonathan Webb, Michael Atighetchi
169
Voted
CONEXT
2010
ACM
15 years 1 months ago
Strengthening forensic investigations of child pornography on P2P networks
Measurements of the Internet for law enforcement purposes must be forensically valid. We examine the problems inherent in using various network- and applicationlevel identifiers i...
Marc Liberatore, Brian Neil Levine, Clay Shields
147
Voted
DATESO
2010
153views Database» more  DATESO 2010»
15 years 1 months ago
Answering Metric Skyline Queries by PM-tree
Abstract. The task of similarity search in multimedia databases is usually accomplished by range or k nearest neighbor queries. However, the expressing power of these "single-...
Tomás Skopal, Jakub Lokoc
156
Voted
GLOBECOM
2010
IEEE
15 years 1 months ago
Robust Spectrum Decision Protocol against Primary User Emulation Attacks in Dynamic Spectrum Access Networks
We propose a spectrum decision protocol resilient to primary user emulation attacks (PUEA) in dynamic spectrum access networks. PUEA is a type of denial-of-service attack that can ...
Z. Jin, S. Anand, K. P. Subbalakshmi
131
Voted
GROUP
2010
ACM
15 years 1 months ago
Everyday favors: a case study of a local online gift exchange system
This paper focuses on online gift exchange in a setting where online and offline interactions are tightly intertwined and most of the exchanges require face-to-face interaction to...
Emmi Suhonen, Airi Lampinen, Coye Cheshire, Judd A...