Sciweavers

1102 search results - page 50 / 221
» Distributed Key Generation for the Internet
Sort
View
DIM
2009
ACM
14 years 2 months ago
Mnikr: reputation construction through human trading of distributed social identities
Reputation forms an important part of how we come to trust people in face-to-face interactions, and thus situations involving trust online have come to realize that reputation is ...
Brendan Francis O'Connor, John Linwood Griffin
MM
2000
ACM
121views Multimedia» more  MM 2000»
14 years 1 days ago
Multimedia content protection by cryptography and watermarking in tamper-resistant hardware
With the rapid growth of broadband network, distribution of multimedia via Internet is a must way to go. Content protection has become one of the most significant and challenging ...
Feng Bao
GECCO
2010
Springer
177views Optimization» more  GECCO 2010»
13 years 9 months ago
Comparison of cauchy EDA and G3PCX algorithms on the BBOB noiseless testbed
Estimation-of-distribution algorithm equipped with Cauchy sampling distribution is compared with the generalized generation gap algorithm with parent centric crossover. Both algor...
Petr Posík
ICEB
2004
297views Business» more  ICEB 2004»
13 years 9 months ago
Security Measures in Mobile Commerce: Problems and Solutions
Due to the advent of the Internet, electronic business transactions have exploded around the globe. Along with the Internet, wireless technology has exponentially developed as wel...
Sanwar Ali, Waleed Farag, Mohammad A. Rob
IPPS
2003
IEEE
14 years 29 days ago
A Novel Design Technology for Next Generation Ubiquitous Computing Architecture
Modern applications for mobile computing require high performance architectures. On the other hand, there are restrictions such as storage or power consumption. The use of reconï¬...
Carsten Nitsch, Camillo Lara, Udo Kebschull