Sciweavers

167 search results - page 29 / 34
» Operators for propagating trust and their evaluation in soci...
Sort
View
SERVICES
2010
233views more  SERVICES 2010»
13 years 3 months ago
Odin: Context-Aware Middleware for Mobile Services
Abstract--Mobile devices such as smart phones are increasing permeating society. With strides in computational power, coupled with the ability to connect to other small devices, sm...
Thiranjith Weerasinghe, Ian Warren
KDD
2009
ACM
167views Data Mining» more  KDD 2009»
14 years 9 months ago
SNARE: a link analytic system for graph labeling and risk detection
Classifying nodes in networks is a task with a wide range of applications. It can be particularly useful in anomaly and fraud detection. Many resources are invested in the task of...
Mary McGlohon, Stephen Bay, Markus G. Anderle, Dav...
ICC
2008
IEEE
126views Communications» more  ICC 2008»
14 years 3 months ago
Effects of Applying High-Speed Congestion Control Algorithms in Satellite Network
— In recent years, many high-speed congestion control (HSCC) algorithms have been proposed for utilizing network pipes with huge bandwidth-delay product (BDP), and some of them h...
Xiuchao Wu, Mun Choon Chan, Akkihebbal L. Ananda
ADHOC
2004
134views more  ADHOC 2004»
13 years 8 months ago
Scalable team multicast in wireless ad hoc networks exploiting coordinated motion
In this paper, we study a new multicast paradigm for large scale mobile ad hoc networks, namely team multicast. In team multicast the multicast group does not consist of individua...
Yunjung Yi, Mario Gerla, Katia Obraczka
DRM
2006
Springer
14 years 7 days ago
Securing sensitive content in a view-only file system
One of the most fundamental problems in computer security is protecting sensitive digital information from unauthorized disclosure. There are a number of challenges, such as spywa...
Kevin Borders, Xin Zhao, Atul Prakash