Sciweavers

8243 search results - page 104 / 1649
» Can We Manage Trust
Sort
View
ICIP
2006
IEEE
14 years 10 months ago
QP_TR Trust Region Blob Tracking Through Scale-Space
A new approach of tracking objects in image sequences is proposed, in which the constant changes of the size and orientation ofthe target can be precisely described. For each inco...
Jingping Jia, Qing Wang, Yanmei Chai, Rongchun Zha...
HPCC
2007
Springer
14 years 3 months ago
Maximum-Objective-Trust Clustering Solution and Analysis in Mobile Ad Hoc Networks
In mobile-AdHoc networks (MANETs), many applications need the support of layer-structure. Clustering solution is the most widely used layerstructure and the choosing of clusterhead...
Qiang Zhang, Guangming Hu, Zhenghu Gong
MAAMAW
1999
Springer
14 years 1 months ago
Cooperative Plan Selection Through Trust
Cooperation plays a fundamental role in multi-agent systems in which individual agents must interact for the overall system to function effectively. However, cooperation inherently...
Nathan Griffiths, Michael Luck
DBSEC
2003
113views Database» more  DBSEC 2003»
13 years 10 months ago
ECPV: Efficient Certificate Path Validation in Public-key Infrastructure
In the current public-key infrastructure (PKI) schemes based on X.509, a relying party must validate a user’s certificate as well as the existence of a path from its trust point...
Mahantesh Halappanavar, Ravi Mukkamala
COMCOM
1999
91views more  COMCOM 1999»
13 years 8 months ago
Group-oriented undeniable signature schemes with a trusted center
Undeniable signature is an intriguing concept introduced by Chaum and Antwerpen at Crypto'89. In 1999, Lee and Hwang presented two group-oriented undeniable signature schemes ...
Narn-Yih Lee, Tzonelih Hwang