Sciweavers

1610 search results - page 251 / 322
» Identity Based Multisignatures
Sort
View
ITRUST
2005
Springer
14 years 4 months ago
Trust Transfer: Encouraging Self-recommendations Without Sybil Attack
Trading privacy for trust thanks to the linkage of pseudonyms has been proposed to mitigate the inherent conflict between trust and privacy. This necessitates fusionym, that is, th...
Jean-Marc Seigneur, Alan Gray, Christian Damsgaard...
SSD
2005
Springer
173views Database» more  SSD 2005»
14 years 4 months ago
On Discovering Moving Clusters in Spatio-temporal Data
A moving cluster is defined by a set of objects that move close to each other for a long time interval. Real-life examples are a group of migrating animals, a convoy of cars movin...
Panos Kalnis, Nikos Mamoulis, Spiridon Bakiras
WADS
2005
Springer
122views Algorithms» more  WADS 2005»
14 years 4 months ago
Hinged Dissection of Polypolyhedra
This paper presents a general family of 3D hinged dissections for polypolyhedra, i.e., connected 3D solids formed by joining several rigid copies of the same polyhedron along iden...
Erik D. Demaine, Martin L. Demaine, Jeffrey F. Lin...
MM
2004
ACM
151views Multimedia» more  MM 2004»
14 years 4 months ago
Multimodal concept-dependent active learning for image retrieval
It has been established that active learning is effective for learning complex, subjective query concepts for image retrieval. However, active learning has been applied in a conc...
Kingshy Goh, Edward Y. Chang, Wei-Cheng Lai
WPES
2004
ACM
14 years 4 months ago
Hidden access control policies with hidden credentials
In an open environment such as the Internet, the decision to collaborate with a stranger (e.g., by granting access to a resource) is often based on the characteristics (rather tha...
Keith B. Frikken, Mikhail J. Atallah, Jiangtao Li