Sciweavers

5088 search results - page 875 / 1018
» Rich Internet Applications
Sort
View
WCNC
2008
IEEE
15 years 11 months ago
A Location Privacy Preserving Authentication Scheme in Vehicular Networks
Abstract—As an emerging application scenario of wireless technologies, vehicular communications have been initiated not only for enhancing the transportation safety and driving e...
Chenxi Zhang, Rongxing Lu, Pin-Han Ho, Anyi Chen
147
Voted
WETICE
2008
IEEE
15 years 11 months ago
Integrating Overlay and Social Networks for Seamless P2P Networking
In this paper we introduce Social VPNs, a novel system architecture which leverages existing social networking infrastructures to enable ad-hoc VPNs which are self-configuring, s...
Renato J. O. Figueiredo, P. Oscar Boykin, Pierre S...
ADMA
2008
Springer
240views Data Mining» more  ADMA 2008»
15 years 11 months ago
Automatic Web Tagging and Person Tagging Using Language Models
Abstract. Social bookmarking has become an important web2.0 application recently, which is concerned with the dual user behavior to search - tagging. Although social bookmarking we...
Qiaozhu Mei, Yi Zhang
AINA
2007
IEEE
15 years 11 months ago
On the Miscollaboration of Congestion Control Mechanisms at the Transport and the Network Layers
Many sophisticated mechanisms have been implemented at both the transport and the network layers in order to estimate network conditions and avoid overload of network links. We ev...
Ageliki Tsioliaridou, Christos V. Samaras, Vassili...
COMSWARE
2007
IEEE
15 years 11 months ago
Competition between SOM Clusters to Model User Authentication System in Computer Networks
—Traditional authentication systems employed on Internet are facing an acute problem of intrusions. In this context we propose a neural architecture for user authentication throu...
Shrijit S. Joshi, Vir V. Phoha