Sciweavers

139 search results - page 21 / 28
» Exploiting information relationships for access control in p...
Sort
View
WPES
2003
ACM
14 years 24 days ago
Policy migration for sensitive credentials in trust negotiation
Trust negotiation is an approach to establishing trust between strangers through the bilateral, iterative disclosure of digital credentials. Under automated trust negotiation, acc...
Ting Yu, Marianne Winslett
WINET
2010
147views more  WINET 2010»
13 years 5 months ago
Hybrid trust and reputation management for sensor networks
Wireless sensor networks are characterised by the distributed nature of their operation and the resource constraints on the nodes. Trust management schemes that are targeted at sen...
Efthimia Aivaloglou, Stefanos Gritzalis
CN
2007
148views more  CN 2007»
13 years 7 months ago
Using taxonomies for content-based routing with ants
Although the ant metaphor has been successfully applied to routing of data packets both in wireless and fixed networks, little is known yet about its appropriateness for search i...
Elke Michlmayr, Arno Pany, Gerti Kappel
ISMAR
2005
IEEE
14 years 1 months ago
Localisation and Interaction for Augmented Maps
Paper-based cartographic maps provide highly detailed information visualisation with unrivalled fidelity and information density. Moreover, the physical properties of paper affor...
Gerhard Reitmayr, Ethan Eade, Tom Drummond
WWW
2005
ACM
14 years 8 months ago
Online curriculum on the semantic Web: the CSD-UoC portal for peer-to-peer e-learning
Online Curriculum Portals aim to support networks of instructors and learners by providing a space of convergence for enhancing peer-to-peer learning interactions among individual...
Dimitris Kotzinos, Sofia Pediaditaki, Apostolos Ap...