Sciweavers

3726 search results - page 653 / 746
» Software Services and Software Maintenance
Sort
View
TISSEC
2010
237views more  TISSEC 2010»
13 years 3 months ago
BLAC: Revoking Repeatedly Misbehaving Anonymous Users without Relying on TTPs
Several credential systems have been proposed in which users can authenticate to service providers anonymously. Since anonymity can give users the license to misbehave, some varia...
Patrick P. Tsang, Man Ho Au, Apu Kapadia, Sean W. ...
EUROSYS
2006
ACM
14 years 6 months ago
Experiences in building and operating ePOST, a reliable peer-to-peer application
Peer-to-peer (p2p) technology can potentially be used to build highly reliable applications without a single point of failure. However, most of the existing applications, such as ...
Alan Mislove, Ansley Post, Andreas Haeberlen, Pete...
CVPR
2005
IEEE
14 years 11 months ago
Evaluating Image Retrieval
We present a comprehensive strategy for evaluating image retrieval algorithms. Because automated image retrieval is only meaningful in its service to people, performance character...
Nikhil V. Shirahatti, Kobus Barnard
ICDE
1999
IEEE
123views Database» more  ICDE 1999»
14 years 10 months ago
Scalable Web Server Design for Distributed Data Management
Traditional techniques for a distributed web server design rely on manipulation of central resources, such as routers or DNS services, to distribute requests designated for a sing...
Scott M. Baker, Bongki Moon
WWW
2008
ACM
14 years 9 months ago
A Study of User Profile Generation from Folksonomies
Recommendation systems which aim at providing relevant information to users are becoming more and more important and desirable due to the enormous amount of information available ...
Ching-man Au Yeung, Nicholas Gibbins, Nigel Shadbo...