Sciweavers

1583 search results - page 188 / 317
» The Quorum Deployment Problem
Sort
View
AINA
2009
IEEE
15 years 4 months ago
Enabling Fast Bootstrap of Reputation in P2P Mobile Networks
The easy deployment of P2P self-organized systems has contributed to their wide diffusion and to the definition of a new communication paradigm. Mobile communities can now sponta...
Roberto G. Cascella
AINA
2009
IEEE
15 years 4 months ago
Similarity Search over DNS Query Streams for Email Worm Detection
Email worms continue to be a persistent problem, indicating that current approaches against this class of selfpropagating malicious code yield rather meagre results. Additionally,...
Nikolaos Chatzis, Nevil Brownlee
HICSS
2009
IEEE
144views Biometrics» more  HICSS 2009»
15 years 4 months ago
Identity Inference as a Privacy Risk in Computer-Mediated Communication
New Web 2.0 applications, with their emphasis on collaboration and communication, hold the promise of major advances in social connectivity and coordination; however, they also in...
Sara Motahari, Sotirios G. Ziavras, Richard P. Sch...
ESORICS
2009
Springer
15 years 4 months ago
Privacy Preservation over Untrusted Mobile Networks
The proliferation of mobile devices has given rise to novel user-centric applications and services. In current mobile systems, users gain access to remote servers over mobile netwo...
Claudio Agostino Ardagna, Sushil Jajodia, Pierange...
PERVASIVE
2009
Springer
15 years 4 months ago
RF-Based Initialisation for Inertial Pedestrian Tracking
Location information is an important source of context for ubiquitous computing systems. We have previously developed a wearable location system that combines a foot-mounted inerti...
Oliver Woodman, Robert Harle