Sciweavers

762 search results - page 113 / 153
» Modeling and Simulating Information Security Management
Sort
View
CONTEXT
2007
Springer
14 years 1 months ago
The Role of Context in Image Interpretation
The problem we address in this paper is the role of context in the interpretation of images when pictures are used as queries. An image usually depicts several objects and is open...
Dag Elgesem, Joan C. Nordbotten
CIKM
2008
Springer
13 years 9 months ago
Social capital in online communities
Online communities are connecting hordes of individuals and generating rich social network data. The social capital that resides within these networks is largely unknown. We propo...
Matthew S. Smith
CONCURRENCY
2004
93views more  CONCURRENCY 2004»
13 years 7 months ago
Studying protein folding on the Grid: experiences using CHARMM on NPACI resources under Legion
-- One of the benefits of a computational grid is the ability to run high-performance applications over distributed resources simply and securely. We demonstrated this benefit with...
Anand Natrajan, Michael Crowley, Nancy Wilkins-Die...
ISCC
2005
IEEE
132views Communications» more  ISCC 2005»
14 years 1 months ago
A Reputation-Based Trust Mechanism for Ad Hoc Networks
— The main characterisrics of ad hoc networks are the lack of predefined infrastructure and the dynamic topology. These characteristics present some new security vulnerabilities...
Yacine Rebahi, Vicente E. Mujica V, Dorgham Sisale...
SACMAT
2005
ACM
14 years 1 months ago
Peer-to-peer access control architecture using trusted computing technology
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard...
Ravi S. Sandhu, Xinwen Zhang