Sciweavers

784 search results - page 72 / 157
» Personalizing access to learning networks
Sort
View
MOBIHOC
2003
ACM
15 years 9 months ago
PAN: providing reliable storage in mobile ad hoc networks with probabilistic quorum systems
Reliable storage of data with concurrent read/write accesses (or query/update) is an ever recurring issue in distributed settings. In mobile ad hoc networks, the problem becomes e...
Jun Luo, Jean-Pierre Hubaux, Patrick Th. Eugster
FC
2010
Springer
173views Cryptology» more  FC 2010»
15 years 5 months ago
A Case Study on Measuring Statistical Data in the Tor Anonymity Network
The Tor network is one of the largest deployed anonymity networks, consisting of 1500+ volunteer-run relays and probably hundreds of thousands of clients connecting every day. Its ...
Karsten Loesing, Steven J. Murdoch, Roger Dingledi...
PERCOM
2006
ACM
16 years 4 months ago
The Master Key: A Private Authentication Approach for Pervasive Computing Environments
We propose a novel entity authentication approach for pervasive computing environments. A person uses a single device, the Master Key, which aggregates all his digital forms of ac...
Feng Zhu, Matt W. Mutka, Lionel M. Ni
120
Voted
ECTEL
2009
Springer
15 years 11 months ago
Sharing Distributed Resources in LearnWeb2.0
Abstract. The success of recent Web 2.0 platforms shows that people share information and resources within their social community and beyond. The use of these platforms in an e-lea...
Fabian Abel, Ivana Marenzi, Wolfgang Nejdl, Sergej...
NIPS
1990
15 years 5 months ago
Bumptrees for Efficient Function, Constraint and Classification Learning
A new class of data structures called "bumptrees" is described. These structures are useful for efficiently implementing a number of neural network related operations. A...
Stephen M. Omohundro