Sciweavers

55 search results - page 6 / 11
» The Consequences of Decentralized Security in a Cooperative ...
Sort
View
ACSAC
2010
IEEE
13 years 5 months ago
Kells: a protection framework for portable data
Portable storage devices, such as key-chain USB devices, are ubiquitous. These devices are often used with impunity, with users repeatedly using the same storage device in open co...
Kevin R. B. Butler, Stephen E. McLaughlin, Patrick...
ECAI
2006
Springer
13 years 11 months ago
Reasoning with Inconsistencies in Propositional Peer-to-Peer Inference Systems
In a peer-to-peer inference system, there is no centralized control or hierarchical organization: each peer is equivalent in functionality and cooperates with other peers in order...
Philippe Chatalic, Gia Hien Nguyen, Marie-Christin...
ICMCS
2006
IEEE
115views Multimedia» more  ICMCS 2006»
14 years 1 months ago
Scalable Image Retrieval from Distributed Images Database
In order to store, and retrieve images from large databases, we propose a framework, based on multiple description coding paradigm, that disseminates images over distributed serve...
Tammam Tillo, Marco Grangetto, Gabriella Olmo
SIGCOMM
2010
ACM
13 years 7 months ago
Trust no one: a decentralized matching service for privacy in location based services
We propose a new approach to ensure privacy in location based services, without requiring any support from a"trusted" entity. We observe that users of location based ser...
Sharad Jaiswal, Animesh Nandi
CSCW
2010
ACM
14 years 4 months ago
The work of sustaining order in wikipedia: the banning of a vandal
In this paper, we examine the social roles of software tools in the English-language Wikipedia, specifically focusing on autonomous editing programs and assisted editing tools. Th...
R. Stuart Geiger, David Ribes