Sciweavers

4897 search results - page 947 / 980
» Trust Modeling for Peer-to-Peer Based Computing Systems
Sort
View
CSE
2009
IEEE
14 years 2 months ago
Analysing BitTorrent's Seeding Strategies
Abstract— BitTorrent is a typical peer-to-peer (P2P) file distribution application that has gained tremendous popularity in recent years. A considerable amount of research exists...
Xinuo Chen, Stephen A. Jarvis
SAC
2003
ACM
14 years 1 months ago
Design Time Support for Adaptive Behavior in Web Sites
Adaptive web sites are sites that automatically improve their internal organization and/or presentation by observing userbrowsing behavior. In this paper we argue that adaptive be...
Sven Casteleyn, Olga De Troyer, Saar Brockmans
ACL
2010
13 years 5 months ago
Efficient Inference through Cascades of Weighted Tree Transducers
Weighted tree transducers have been proposed as useful formal models for representing syntactic natural language processing applications, but there has been little description of ...
Jonathan May, Kevin Knight, Heiko Vogler
SIBGRAPI
2008
IEEE
14 years 2 months ago
PCA-Based 3D Face Photography
This paper presents a 3D face photography system based on a small set of training facial range images. The training set is composed by 2D texture and 3D range images (i.e. geometr...
Jesus P. Mena-Chalco, Ives Macedo, Luiz Velho, Rob...
NDSS
2003
IEEE
14 years 1 months ago
Proactive Two-Party Signatures for User Authentication
We study proactive two-party signature schemes in the context of user authentication. A proactive two-party signature scheme (P2SS) allows two parties—the client and the serverâ...
Antonio Nicolosi, Maxwell N. Krohn, Yevgeniy Dodis...