Sciweavers

1833 search results - page 95 / 367
» Mechanized Verification with Sharing
Sort
View
81
Voted
PUC
2007
156views more  PUC 2007»
15 years 9 days ago
Collaborative capturing, interpreting, and sharing of experiences
This paper proposes a notion of interaction corpus, a captured collection of human behaviors and interactions among humans and artifacts. Digital multimedia and ubiquitous sensor t...
Yasuyuki Sumi, Sadanori Ito, Tetsuya Matsuguchi, S...
179
Voted
MIS
2011
Springer
256views Multimedia» more  MIS 2011»
14 years 7 months ago
Event sharing in vehicular networks using geographic vectors and maps
By exchanging events in a vehicular ad hoc network (VANET), drivers can receive information that allows them to find relevant places (e.g., parking spaces) or avoid dangerous/unde...
Thierry Delot, Sergio Ilarri, Nicolas Cenerario, T...
87
Voted
ACNS
2008
Springer
88views Cryptology» more  ACNS 2008»
15 years 7 months ago
On the Effectiveness of Internal Patching Against File-Sharing Worms
File-sharing worms have been terrorizing Peer-to-peer (P2P) systems in recent years. Existing defenses relying on users’ individual recoveries or limiting users’ file-sharing ...
Liang Xie, Hui Song, Sencun Zhu
109
Voted
UCS
2007
Springer
15 years 7 months ago
RFID Privacy Using Spatially Distributed Shared Secrets
Many of today’s proposed RFID privacy schemes rely on the encryption of tag IDs with user-chosen keys. However, password management quickly becomes a bottleneck in such proposals...
Marc Langheinrich, Remo Marti
IPTPS
2005
Springer
15 years 6 months ago
The Bittorrent P2P File-Sharing System: Measurements and Analysis
Of the many P2P file-sharing prototypes in existence, BitTorrent is one of the few that has managed to attract millions of users. BitTorrent relies on other (global) components f...
Johan A. Pouwelse, Pawel Garbacki, Dick H. J. Epem...