Sciweavers

10 search results - page 2 / 2
» dim 2009
Sort
View
DIM
2009
ACM
15 years 4 months ago
Using identity credential usage logs to detect anomalous service accesses
For e-commerce companies providing online services, fraudulent access resulting from theft of identity credentials is a serious concern. Such online service providers deploy a var...
Daisuke Mashima, Mustaque Ahamad
DIM
2009
ACM
15 years 6 months ago
Mnikr: reputation construction through human trading of distributed social identities
Reputation forms an important part of how we come to trust people in face-to-face interactions, and thus situations involving trust online have come to realize that reputation is ...
Brendan Francis O'Connor, John Linwood Griffin
92
Voted
DIM
2009
ACM
15 years 6 months ago
Privacy-aware identity management for client-side mashup applications
This paper concerns the problem of identity management in modern Web-2.0-based mashup applications. Identity management supports convenient access to information when mashups are ...
Saman Zarandioon, Danfeng Yao, Vinod Ganapathy
113
Voted
ACCV
2009
Springer
15 years 3 months ago
Image Enhancement of Low-Light Scenes with Near-Infrared Flash Images
Abstract. We present a novel technique for enhancing an image captured in low light by using near-infrared flash images. The main idea is to combine a color image with near-infrar...
Sosuke Matsui, Takahiro Okabe, Mihoko Shimano, Yoi...
CPAIOR
2009
Springer
15 years 6 months ago
Modelling Search Strategies in Rules2CP
In this abstract, we present a rule-based modelling language for constraint programming, called Rules2CP [1], and a library PKML for modelling packing problems. Unlike other modell...
François Fages, Julien Martin