Sciweavers

525 search results - page 44 / 105
» Information Distance from a Question to an Answer
Sort
View
FC
2010
Springer
135views Cryptology» more  FC 2010»
13 years 11 months ago
Multichannel Protocols to Prevent Relay Attacks
A number of security systems, from Chip-and-PIN payment cards to contactless subway and train tokens, as well as secure localization systems, are vulnerable to relay attacks. Encry...
Frank Stajano, Ford-Long Wong, Bruce Christianson
COMPSAC
2003
IEEE
14 years 28 days ago
Testing the Suitability of Markov Chains as Web Usage Models
Markov chains have been used to model web usages and served as the basis for statistical testing, performance evaluation, and reliability analysis. However, most of such applicati...
Zhao Li, Jeff Tian
BCSHCI
2008
13 years 9 months ago
Motivation for adopting emergency response technology in community settings
My dissertation work focuses on the motivation for adopting emergency response technology in community settings. The main purpose of my study is to understand various factors that...
Philip Fei Wu
SEMCO
2007
IEEE
14 years 1 months ago
The "Spree" Expert Finding System
This paper proposes a system to facilitate exchange of information by automatically finding experts, competent in answering a given question. Our objective is to provide an onlin...
Florian Metze, Christian Bauckhage, Tansu Alpcan
CLIMA
2004
13 years 9 months ago
Inferring Trust
In this paper we discuss Liau's logic of Belief, Inform and Trust (BIT), which captures the use of trust to infer beliefs from acquired information. However, the logic does no...
Mehdi Dastani, Andreas Herzig, Joris Hulstijn, Lee...