Sciweavers

211 search results - page 27 / 43
» Towards Security Evaluation Based on Evidence Collection
Sort
View
IJVR
2007
106views more  IJVR 2007»
13 years 7 months ago
Responses of Participants During an Immersive Virtual Environment Experience
—This paper reports on the results of an experiment designed to study fine grain physiological responses of participants to an immersive virtual simulation of an urban environmen...
Andrea Brogni, Vinoba Vinayagamoorthy, Anthony Ste...
ICDCSW
2008
IEEE
14 years 1 months ago
Modeling Attack Behaviors in Rating Systems
Abstract— Online feedback-based rating systems are gaining popularity. Dealing with unfair ratings in such systems has been recognized as an important problem and many unfair rat...
Qinyuan Feng, Yafei Yang, Yan Lindsay Sun, Yafei D...
ISI
2007
Springer
14 years 1 months ago
A Combinatorial Approach to Measuring Anonymity
— In this paper we define a new metric for quantifying the degree of anonymity collectively afforded to users of an anonymous communication system. We show how our metric, based...
Matthew Edman, Fikret Sivrikaya, Bülent Yener
ICC
2007
IEEE
245views Communications» more  ICC 2007»
14 years 1 months ago
A Node Recovery Scheme for Data Dissemination in Wireless Sensor Networks
—In wireless sensor networks, sensor nodes are expected to gather specific information about the environment and send it to the user. The data dissemination usually involves many...
Faycal Bouhafs, Madjid Merabti, Hala M. Mokhtar
SDM
2008
SIAM
140views Data Mining» more  SDM 2008»
13 years 9 months ago
Creating a Cluster Hierarchy under Constraints of a Partially Known Hierarchy
Although clustering under constraints is a current research topic, a hierarchical setting, in which a hierarchy of clusters is the goal, is usually not considered. This paper trie...
Korinna Bade, Andreas Nürnberger