Sciweavers

3058 search results - page 450 / 612
» Reflections on Reflections
Sort
View
ENTCS
2006
80views more  ENTCS 2006»
15 years 5 months ago
Synchronisation in Trust Management Using Push Authorisation
Traditional trust management authorisation decisions for distributed technologies, are, in general, based on the history of the authorisations/computation to date. We consider thi...
Thomas B. Quillinan, Simon N. Foley
IJCGA
2008
77views more  IJCGA 2008»
15 years 5 months ago
Bounded-Velocity Approximation of Mobile Euclidean 2-Centres
Given a set P of points (clients) in the plane, a Euclidean 2-centre of P is a set of two points (facilities) in the plane such that the maximum distance from any client to its ne...
Stephane Durocher, David G. Kirkpatrick
IJMMS
2008
131views more  IJMMS 2008»
15 years 5 months ago
Avatars in social media: Balancing accuracy, playfulness and embodied messages
This paper examines how users negotiate their self-presentation via an avatar used in social media. Twenty participants customised an avatar while thinking aloud. An analysis of t...
Asimina Vasalou, Adam N. Joinson, Tanja Bänzi...
IJNSEC
2008
88views more  IJNSEC 2008»
15 years 5 months ago
Security Requirements for RFID Computing Systems
Many security and privacy protocols for RFID systems have been proposed [8, 13, 19, 20]. In most cases these protocols are evaluated in terms of security based on some model. Ofte...
Xiaolan Zhang 0003, Brian King
146
Voted
IJNSEC
2008
150views more  IJNSEC 2008»
15 years 5 months ago
Tamper Resistant Software Through Intent Protection
One approach to protect distributed systems implemented with mobile code is through program obfuscation. Disguising program intent is a form of information hiding that facilitates...
Alec Yasinsac, J. Todd McDonald