Sciweavers

5088 search results - page 868 / 1018
» Rich Internet Applications
Sort
View
175
Voted
ICDS
2010
IEEE
15 years 11 months ago
e-Fraud Prevention Based on the Self-Authentication of e-Documents
—We consider a method for preventing e-Fraud in which a binary image is encrypted with a floating point cipher using a convolution operation and the output quantized into a 1-bi...
J. M. Blackledge, E. Coyle
137
Voted
TEI
2010
ACM
135views Hardware» more  TEI 2010»
15 years 11 months ago
Hands and fingers: a mobile platform for a person-centric network of computational objects
We describe a practical vision of ubiquitous computing with tangible interfaces, that orbits around an individual and is mediated by his or her personal consumer electronic device...
John Kestner, Henry Holtzman
146
Voted
CCS
2010
ACM
15 years 11 months ago
A game theoretic model for digital identity and trust in online communities
Digital identity and trust management mechanisms play an important role on the Internet. They help users make decisions on trustworthiness of digital identities in online communit...
Tansu Alpcan, Cengiz Örencik, Albert Levi, Er...
EDBTW
2010
Springer
15 years 11 months ago
Collaborative data privacy for the web
While data privacy is a human right, it is challenging to enforce it. For example, if multiple retailers execute a single order at Amazon Marketplace, each retailer can use diffe...
Clemens Heidinger, Erik Buchmann, Klemens Böh...
141
Voted
PAM
2010
Springer
15 years 11 months ago
Yes, We LEDBAT: Playing with the New BitTorrent Congestion Control Algorithm
Since December 2008, the official BitTorrent client is using a new congestion-control protocol for data transfer, implemented at the application layer and built over UDP at the tr...
Dario Rossi, Claudio Testa, Silvio Valenti