Sciweavers

361 search results - page 59 / 73
» A Vector Model of Trust for Developing Trustworthy Systems
Sort
View
SIGMOD
2012
ACM
250views Database» more  SIGMOD 2012»
11 years 11 months ago
Authenticating location-based services without compromising location privacy
The popularity of mobile social networking services (mSNSs) is propelling more and more businesses, especially those in retailing and marketing, into mobile and location-based for...
Haibo Hu, Jianliang Xu, Qian Chen, Ziwei Yang
INFOCOM
2002
IEEE
14 years 1 months ago
Power and Server Allocation in a Multi-Beam Satellite with Time Varying Channels
-- We consider power and server allocation in a multi-beam satellite downlink which transmits data to N different ground locations over N time-varying channels. Packets destined fo...
Michael J. Neely, Eytan Modiano, Charles E. Rohrs
AGENTS
1998
Springer
14 years 29 days ago
WebMate: A Personal Agent for Browsing and Searching
The World-Wide Web is developing very fast. Currently, nding useful information on the Web is a time consuming process. In this paper, we present WebMate, an agent that helps user...
Liren Chen, Katia P. Sycara
ICPR
2008
IEEE
14 years 3 months ago
Facial feature estimation from the local structural diversity of skulls
In forensics, the craniofacial reconstruction is employed as an initialization of the identification from skulls. It is a challenging work to develop such a system due to the ambi...
Yuru Pei, Hongbin Zha, Zhongbiao Yuan
KDD
2009
ACM
180views Data Mining» more  KDD 2009»
14 years 9 months ago
Mining social networks for personalized email prioritization
Email is one of the most prevalent communication tools today, and solving the email overload problem is pressingly urgent. A good way to alleviate email overload is to automatical...
Shinjae Yoo, Yiming Yang, Frank Lin, Il-Chul Moon