Sciweavers

6656 search results - page 1136 / 1332
» Change, Change, Change: Three Approaches
Sort
View
ISBI
2008
IEEE
14 years 10 months ago
Quantified brain asymmetry for age estimation of normal and AD/MCI subjects
We propose a quantified asymmetry based method for age estimation. Our method uses machine learning to discover automatically the most discriminative asymmetry feature set from di...
Leonid Teverovskiy, James T. Becker, Oscar L. Lope...
WWW
2005
ACM
14 years 10 months ago
TrustGuard: countering vulnerabilities in reputation management for decentralized overlay networks
Reputation systems have been popular in estimating the trustworthiness and predicting the future behavior of nodes in a large-scale distributed system where nodes may transact wit...
Mudhakar Srivatsa, Li Xiong, Ling Liu
PKC
2009
Springer
116views Cryptology» more  PKC 2009»
14 years 9 months ago
Improving the Boneh-Franklin Traitor Tracing Scheme
Abstract. Traitor tracing schemes are cryptographically secure broadcast methods that allow identification of conspirators: if a pirate key is generated by k traitors out of a stat...
Pascal Junod, Alexandre Karlov, Arjen K. Lenstra
CHI
2002
ACM
14 years 9 months ago
Effects of four computer-mediated communications channels on trust development
When virtual teams need to establish trust at a distance, it is advantageous for them to use rich media to communicate. We studied the emergence of trust in a social dilemma game ...
Nathan Bos, Judith S. Olson, Darren Gergle, Gary M...
SIGMOD
2007
ACM
124views Database» more  SIGMOD 2007»
14 years 9 months ago
Querying xml with update syntax
This paper investigates a class of transform queries proposed by XQuery Update [6]. A transform query is defined in terms of XML update syntax. When posed on an XML tree T, it ret...
Wenfei Fan, Gao Cong, Philip Bohannon
« Prev « First page 1136 / 1332 Last » Next »