Sciweavers

1988 search results - page 217 / 398
» Securing Information Transfer in Distributed Computing Envir...
Sort
View
MOBILITY
2009
ACM
15 years 7 months ago
Context-sensitive authorization in interaction patterns
Main requirement of recent computing environments, like mobile and then ubiquitous computing, is to adapt applications to context. On the other hand, access control generally trus...
Vincent Hourdin, Jean-Yves Tigli, Stephane Lavirot...
142
Voted
ATAL
2008
Springer
15 years 4 months ago
Demonstration of multi-agent potential fields in real-time strategy games
Bots for Real Time Strategy (RTS) games provide a rich challenge to implement. A bot controls a number of units that may have to navigate in a partially unknown environment, while...
Johan Hagelbäck, Stefan J. Johansson
153
Voted
CIKM
2009
Springer
15 years 7 months ago
A novel approach for privacy mining of generic basic association rules
Data mining can extract important knowledge from large data collections - but sometimes these collections are split among various parties. Privacy concerns may prevent the parties...
Moez Waddey, Pascal Poncelet, Sadok Ben Yahia
ICCCN
2008
IEEE
15 years 9 months ago
Clique-Based Location Estimations for Wireless Sensors in GPS-Free Environments
– In this paper we present a distributed, self-organizing, localization method for wireless sensors and a scheme for reducing position estimate errors by employing a novel concep...
Patryk Mazurkiewicz, Kin K. Leung
136
Voted
ACMICEC
2004
ACM
148views ECommerce» more  ACMICEC 2004»
15 years 8 months ago
A secure and private clarke tax voting protocol without trusted authorities
Electronic voting has become one of the most popular activities over the Internet. Security and privacy are always regarded as crucial factors in electronic voting system design. ...
Changjie Wang, Ho-fung Leung