Sciweavers

5227 search results - page 1021 / 1046
» Enterprise modeling using class and instance models
Sort
View
106
Voted
CCS
2009
ACM
15 years 10 months ago
A metadata calculus for secure information sharing
In both commercial and defense sectors a compelling need is emerging for rapid, yet secure, dissemination of information to the concerned actors. Traditional approaches to informa...
Mudhakar Srivatsa, Dakshi Agrawal, Steffen Reidt
CSFW
2009
IEEE
15 years 10 months ago
More Anonymous Onion Routing Through Trust
We consider using trust information to improve the anonymity provided by onion-routing networks. In particular, we introduce a model of trust in network nodes and use it to design...
Aaron Johnson, Paul F. Syverson
COSIT
2009
Springer
116views GIS» more  COSIT 2009»
15 years 10 months ago
The Endpoint Hypothesis: A Topological-Cognitive Assessment of Geographic Scale Movement Patterns
Movement patterns of individual entities at the geographic scale are becoming a prominent research focus in spatial sciences. One pertinent question is how cognitive and formal cha...
Alexander Klippel, Rui Li
SIGCOMM
2009
ACM
15 years 9 months ago
Temporal distance metrics for social network analysis
The analysis of social and technological networks has attracted a lot of attention as social networking applications and mobile sensing devices have given us a wealth of real data...
John Tang, Mirco Musolesi, Cecilia Mascolo, Vito L...
133
Voted
INFOCOM
2008
IEEE
15 years 9 months ago
Real-Time Video Multicast in WiMAX Networks
Abstract—IEEE 802.16e WiMAX is a promising new technology for broadband access networks. Amongst the class of applications that can be supported is real time video services (such...
Supratim Deb, Sharad Jaiswal, Kanthi Nagaraj
« Prev « First page 1021 / 1046 Last » Next »