Sciweavers

162 search results - page 29 / 33
» The Design of a Trustworthy Voting System
Sort
View
TISSEC
2008
235views more  TISSEC 2008»
13 years 8 months ago
SDAP: A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks
Hop-by-hop data aggregation is a very important technique for reducing the communication overhead and energy expenditure of sensor nodes during the process of data collection in a...
Yi Yang, Xinran Wang, Sencun Zhu, Guohong Cao
GIS
2003
ACM
14 years 9 months ago
Attribute space visualization of demographic change
This paper introduces an approach for closer integration of selforganizing maps into the visualization of spatio-temporal phenomena in GIS. It is proposed to provide a more explic...
André Skupin, Ron Hagelman
CHI
2008
ACM
14 years 9 months ago
Friends and foes: ideological social networking
Traditional online social network sites use a single monolithic "friends" relationship to link users. However, users may have more in common with strangers, suggesting t...
Gábor Szabó, Michael J. Brzozowski, ...
CARDIS
2004
Springer
126views Hardware» more  CARDIS 2004»
14 years 1 months ago
Anonymous Services using Smart Cards and Cryptography
More and more services provided by Internet pose a problem of privacy and anonymity. One cryptographic tool that could be used for solving this problem is the group signature [1, 5...
Sébastien Canard, Jacques Traoré
CASSIS
2004
Springer
14 years 1 months ago
ESC/Java2: Uniting ESC/Java and JML
The ESC/Java tool was a lauded advance in effective static checking of realistic Java programs, but has become out-of-date with respect to Java and the Java Modeling Language (JML...
David R. Cok, Joseph Kiniry