Sciweavers

7741 search results - page 1449 / 1549
» Security in Active Networks
Sort
View
IFIP
2010
Springer
14 years 11 months ago
Semantics of Trust
This paper formalizes the semantics of trust and studies the transitivity of trust. On the Web, people and software agents have to interact with "strangers". This makes ...
Tim Muller
IGARSS
2010
14 years 11 months ago
Hands-on GPS and remote sensing training for high school learners during IGARSS 2009 in Cape Town, South Africa
Continuing the commitment of the Geoscience and Remote Sensing Society (GRSS) to education and outreach, the IEEE 2009 International Geoscience and Remote Sensing Symposium (IGARSS...
Linda Hayden, Ambrose Jearld, Je'aime Powell, Kuch...
TITS
2010
110views Education» more  TITS 2010»
14 years 11 months ago
Research Collaboration and ITS Topic Evolution: 10 Years at T-ITS
This paper investigates the collaboration patterns and research topic trends in the publications of the IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (T-ITS) over the pas...
Linjing Li, Xin Li, Changjian Cheng, Cheng Chen, G...
TWC
2010
14 years 11 months ago
Coordinated beamforming for the multicell multi-antenna wireless system
In a conventional wireless cellular system, signal processing is performed on a per-cell basis; out-of-cell interference is treated as background noise. This paper considers the be...
Hayssam Dahrouj, Wei Yu
118
Voted
IJISEC
2011
71views more  IJISEC 2011»
14 years 7 months ago
Principles of remote attestation
Remote attestation is the activity of making a claim about properties of a target by supplying evidence to an appraiser over a network. We identify five central principles to guid...
George Coker, Joshua D. Guttman, Peter Loscocco, A...
« Prev « First page 1449 / 1549 Last » Next »