Sciweavers

46 search results - page 4 / 10
» Identity management: multiple presentations of self in faceb...
Sort
View
INFOCOM
2012
IEEE
11 years 10 months ago
SybilDefender: Defend against sybil attacks in large social networks
—Distributed systems without trusted identities are particularly vulnerable to sybil attacks, where an adversary creates multiple bogus identities to compromise the running of th...
Wei Wei, Fengyuan Xu, Chiu Chiang Tan, Qun Li
BROADNETS
2007
IEEE
14 years 1 months ago
Monitoring and alarm management in transparent optical networks
—Rapid fault identification and localization in optical networks are crucial due to high data rates. These problems are more challenging than in traditional electronic networks ...
Sava Stanic, Gokhan Sahin, Hongsik Choi, Suresh Su...
HICSS
2002
IEEE
144views Biometrics» more  HICSS 2002»
14 years 13 days ago
Managing Long Term Communications: Conversation and Contact Management
Contact management is an important part of everyday work. People exchange business cards to try to enter each other’s contact lists. Local businesses provide refrigerator magnet...
Steve Whittaker, Quentin Jones, Loren G. Terveen
EUROSSC
2006
Springer
13 years 11 months ago
Dynamic Bayesian Networks for Visual Surveillance with Distributed Cameras
Abstract. This paper presents a surveillance system for tracking multiple people through a wide area with sparsely distributed cameras. The computational core of the system is an a...
Wojciech Zajdel, Ali Taylan Cemgil, Ben J. A. Kr&o...
AINA
2007
IEEE
14 years 1 months ago
Home-Explorer: Search, Localize and Manage the Physical Artifacts Indoors
A new system named Home-Explorer is proposed to search and localize physical artifacts in smart indoor environment. Our view is object-centered and sensors are attached to several...
Bin Guo, Michita Imai