Sciweavers

328 search results - page 14 / 66
» Are You Being Served
Sort
View
SIGIR
2009
ACM
14 years 2 months ago
Detecting spammers and content promoters in online video social networks
A number of online video social networks, out of which YouTube is the most popular, provides features that allow users to post a video as a response to a discussion topic. These f...
Fabrício Benevenuto, Tiago Rodrigues, Virg&...
FC
2010
Springer
205views Cryptology» more  FC 2010»
13 years 11 months ago
On Robust Key Agreement Based on Public Key Authentication
—This paper discusses public-key authenticated key agreement protocols. First, we critically analyze several authenticated key agreement protocols and uncover various theoretical...
Feng Hao
ESWS
2008
Springer
13 years 9 months ago
Rabbit: Developing a Control Natural Language for Authoring Ontologies
: The mathematical nature of description logics has meant that domain experts find them hard to understand. This forms a significant impediment to the creation and adoption of onto...
Glen Hart, Martina Johnson, Catherine Dolbear
EXPERT
2006
156views more  EXPERT 2006»
13 years 7 months ago
Computational Models of Ethical Reasoning: Challenges, Initial Steps, and Future Directions
on abstract principles that you can't easily apply in a formal, deductive fashion. So, the favorite tools of logicians and mathematicians, such as firstorder logic, aren'...
Bruce M. McLaren
JIPS
2006
75views more  JIPS 2006»
13 years 7 months ago
Server Selection Schemes Considering Node Status For a Fault-Tolerant Streaming Service on a Peer-to-Peer Network
: Peer-to-Peer (P2P) networks are attracting considerable research interest because of their scalability and high performance relative to cost. One of the important services on a P...
Hyunjoo Kim, Sooyong Kang, Heon Young Yeom