Sciweavers

77 search results - page 9 / 16
» Identity and Identification in a Networked World
Sort
View
DIM
2007
ACM
14 years 15 days ago
Using reputation to augment explicit authorization
Online social networks are formed when web applications allow users to contribute to an online community. The explosive growth of these social networks taxes the management capaci...
Phillip J. Windley, Devlin Daley, Bryant Cutler, K...
WOWMOM
2009
ACM
143views Multimedia» more  WOWMOM 2009»
14 years 3 months ago
Enhanced Ripple (E-Ripple) protocol for chain-based multihop wireless networks
It has been shown that IEEE 802.11 DCF medium access control (MAC) protocol may not be suitable for multihop wireless networks due to its relatively low throughput and severely un...
Quang Vu Nguyen, Ray-Guang Cheng
ICDE
2006
IEEE
161views Database» more  ICDE 2006»
14 years 2 months ago
Reputation Lending for Virtual Communities
Reputation management schemes have recently emerged as a mechanism for improving trust and security in peer-topeer networks. A new entrant in a network with reputation management ...
Anurag Garg, Alberto Montresor, Roberto Battiti
IEEEARES
2007
IEEE
14 years 2 months ago
Using Privacy Process Patterns for Incorporating Privacy Requirements into the System Design Process
In the online world every person has to hold a number of different data sets so as to be able to have access to various e-services and take part in specific economical and social ...
Christos Kalloniatis, Evangelia Kavakli, Stefanos ...
ACIVS
2006
Springer
14 years 2 months ago
Color-Based Multiple Agent Tracking for Wireless Image Sensor Networks
This paper presents an implementation of a color-based multiple agent tracking algorithm targeted for wireless image sensor networks. The proposed technique is based on employing l...
Emre Oto, Frances Lau, Hamid K. Aghajan