Sciweavers

2478 search results - page 315 / 496
» Message from the Chair
Sort
View
116
Voted
CEAS
2008
Springer
15 years 3 months ago
Exploiting Transport-Level Characteristics of Spam
We present a novel spam detection technique that relies on neither content nor reputation analysis. This work investigates the discriminatory power of email transport-layer charac...
Robert Beverly, Karen R. Sollins
127
Voted
CISC
2008
Springer
152views Cryptology» more  CISC 2008»
15 years 3 months ago
Privacy for Private Key in Signatures
One of the important applications of digital signature is anonymous credential or pseudonym system. In these scenarios, it is essential that the identity of the signer is kept secr...
Qianhong Wu, Bo Qin, Yi Mu, Willy Susilo
121
Voted
CSCW
2006
ACM
15 years 3 months ago
CVS integration with notification and chat: lightweight software team collaboration
Code management systems like Concurrent Version System (CVS) can play an important role in supporting coordination in software development, but often at some time removed from ori...
Geraldine Fitzpatrick, Paul Marshall, Anthony Phil...
153
Voted
CVPR
2005
IEEE
15 years 3 months ago
Dense Photometric Stereo Using Tensorial Belief Propagation
We address the normal reconstruction problem by photometric stereo using a uniform and dense set of photometric images captured at fixed viewpoint. Our method is robust to spurio...
Kam-Lun Tang, Chi-Keung Tang, Tien-Tsin Wong
128
Voted
REST
2010
ACM
15 years 2 months ago
A formal definition of RESTful semantic web services
In this article a formal model applying REST architectural principles to the description of semantic web services is introduced, including the discussion of its syntax and operati...
Antonio Garrote Hernández, María N. ...