Sciweavers

4812 search results - page 830 / 963
» Superimposed Information for the Internet
Sort
View
WCNC
2008
IEEE
15 years 8 months ago
A Location Privacy Preserving Authentication Scheme in Vehicular Networks
Abstract—As an emerging application scenario of wireless technologies, vehicular communications have been initiated not only for enhancing the transportation safety and driving e...
Chenxi Zhang, Rongxing Lu, Pin-Han Ho, Anyi Chen
ADMA
2008
Springer
240views Data Mining» more  ADMA 2008»
15 years 8 months ago
Automatic Web Tagging and Person Tagging Using Language Models
Abstract. Social bookmarking has become an important web2.0 application recently, which is concerned with the dual user behavior to search - tagging. Although social bookmarking we...
Qiaozhu Mei, Yi Zhang
EUROMICRO
2007
IEEE
15 years 8 months ago
A Light-Weight Implementation Scheme of the Tree Morphing Protocol for Mobile Multicast Sources
Multicast network services advantageously complement multimedia information and communication technologies, as they open up the realm for highly scalable multicustomer application...
Olaf Christ, Thomas C. Schmidt, Matthias Wähl...
HICSS
2007
IEEE
119views Biometrics» more  HICSS 2007»
15 years 8 months ago
Collection of U.S. Extremist Online Forums: A Web Mining Approach
Extremists’ exploitation of computer-mediated communications such as online forums has recently gained much attention from academia and the government. However, due to the cover...
Yilu Zhou, Jialun Qin, Guanpi Lai, Hsinchun Chen
HICSS
2007
IEEE
121views Biometrics» more  HICSS 2007»
15 years 8 months ago
Privacy Policy Representation in Web-based Healthcare
The Health Insurance Portability and Accountability Act of 1996 (HIPAA) has resulted in the presence of very descriptive privacy policies on healthcare websites. These policies ar...
Julia Brande Earp, Matthew W. Vail, Annie I. Ant&o...