Sciweavers

683 search results - page 116 / 137
» Voting Technologies and Trust
Sort
View
ESORICS
2009
Springer
15 years 4 months ago
Privacy Preservation over Untrusted Mobile Networks
The proliferation of mobile devices has given rise to novel user-centric applications and services. In current mobile systems, users gain access to remote servers over mobile netwo...
Claudio Agostino Ardagna, Sushil Jajodia, Pierange...
ICPPW
2009
IEEE
15 years 4 months ago
Audio-Based Self-Organizing Authentication for Pervasive Computing: A Cyber-Physical Approach
—Pervasive computing is fast becoming a reality with rapid advance in computing and networking technologies. It has the characteristics of scalability, invisibility, and the abse...
Su Jin Kim, Sandeep K. S. Gupta
CIKM
2009
Springer
15 years 4 months ago
Exploiting bidirectional links: making spamming detection easier
Previous anti-spamming algorithms based on link structure suffer from either the weakness of the page value metric or the vagueness of the seed selection. In this paper, we propos...
Yan Zhang, Qiancheng Jiang, Lei Zhang, Yizhen Zhu
66
Voted
HICSS
2008
IEEE
94views Biometrics» more  HICSS 2008»
15 years 4 months ago
The Impact of Conflict and Conflict Management Style on Deadbeats and Deserters in Virtual Teams
Individuals face additional challenges when interacting in virtual teams. The lack of media richness and the asynchronous nature of technologically transmitted messages make commu...
Kimberly A. Furumo
KBSE
2008
IEEE
15 years 3 months ago
Testing Peers' Volatility
—Peer-to-peer (P2P) is becoming a key technology for software development, but still lacks integrated solutions to build trust in the final software, in terms of correctness and...
Eduardo Cunha de Almeida, Gerson Sunyé, Yve...