Sciweavers

4897 search results - page 881 / 980
» Trust Modeling for Peer-to-Peer Based Computing Systems
Sort
View
SIGCOMM
2010
ACM
15 years 4 months ago
Fived: a service-based architecture implementation to innovate at the endpoints
Security functions such as access control, encryption and authentication are typically left up to applications on the modern Internet. There is no unified system to implement thes...
D. J. Capelis, Darrell D. E. Long
JOT
2007
108views more  JOT 2007»
15 years 4 months ago
Diffraction Rangefinding in Java
We describe a prototype of a diffraction range finding camera implemented in, and simulated by, Java. This sensor is able to digitize objects in 3D using only a single video camer...
Douglas Lyon
ENTCS
2002
125views more  ENTCS 2002»
15 years 4 months ago
Specification of Logic Programming Languages from Reusable Semantic Building Blocks
We present a Language Prototyping System that facilitates the modular development of interpreters from independent semantic buildks. The abstract syntax is modelled as the fixpoint...
José Emilio Labra Gayo, Juan Manuel Cueva L...
COGSR
2010
74views more  COGSR 2010»
14 years 11 months ago
Two qubits for C.G. Jung's theory of personality
We propose a formalization of C.G. Jung's theory of personality using a four-dimensional Hilbert-space for the representation of two qubits. The first qubit relates to Jung&#...
Reinhard Blutner, Elena Hochnadel
WWW
2011
ACM
14 years 11 months ago
Truthy: mapping the spread of astroturf in microblog streams
Online social media are complementing and in some cases replacing person-to-person social interaction and redefining the diffusion of information. In particular, microblogs have ...
Jacob Ratkiewicz, Michael Conover, Mark Meiss, Bru...