Sciweavers

6137 search results - page 1008 / 1228
» Securing Collaborative Applications
Sort
View
AIL
2004
111views more  AIL 2004»
15 years 2 months ago
Anonymity and software agents: An interdisciplinary challenge
Software agents that play a role in E-commerce and E-government applications involving the Internet often contain information about the identity of their human user such as credit ...
Frances M. T. Brazier, Anja Oskamp, Corien Prins, ...
JWSR
2007
129views more  JWSR 2007»
15 years 2 months ago
Extensible Architecture for High-Performance, Scalable, Reliable Publish-Subscribe Eventing and Notification
Existing Web service notification and eventing standards are useful in many applications, but they have serious limitations that make them ill-suited for large-scale deployments, ...
Krzysztof Ostrowski, Ken Birman, Danny Dolev
SIAMCOMP
2002
95views more  SIAMCOMP 2002»
15 years 1 months ago
A Linear Algorithm for Finding the Invariant Edges of an Edge-Weighted Graph
Given an edge-weighted graph where all weights are nonnegative reals, an edge reweighting is an assignment of nonnegative reals to edges such that, for each vertex, the sums of giv...
Francesco M. Malvestuto, Mauro Mezzini
EKAW
2010
Springer
15 years 24 days ago
Representing, Proving and Sharing Trustworthiness of Web Resources Using Veracity
The World Wide Web has evolved into a distributed network of web applications facilitating the publication of information on a large scale. Judging whether such information can be ...
Grégoire Burel, Amparo Elizabeth Cano, Matt...
ICRA
2010
IEEE
195views Robotics» more  ICRA 2010»
15 years 23 days ago
Cooperative tracking of moving objects and face detection with a dual camera sensor
— This paper describes a sensor for autonomous surveillance capable of continuously monitoring the environment, while acquiring detailed images of specific areas. This is achiev...
Stefano Ghidoni, Alberto Pretto, Emanuele Menegatt...
« Prev « First page 1008 / 1228 Last » Next »