Sciweavers

3021 search results - page 501 / 605
» Trust in recommender systems
Sort
View
HICSS
2007
IEEE
123views Biometrics» more  HICSS 2007»
14 years 4 months ago
The Case of Honda: A Dialectical yet Coherent Firm
—This conceptual paper proposes that Honda’s innovative prowess of producing both radical and disruptive innovations within their aerospace and automotive/pick-up truck develop...
W. David Holford, Mehran Ebrahimi
HICSS
2007
IEEE
116views Biometrics» more  HICSS 2007»
14 years 4 months ago
Fine-Grained and Scalable Approaches for Message Integrity
When we have multiple users compiling a single message, including shared contents, metadata, policy, and so on, the integrity of the contents created by individual users needs to ...
Joon S. Park, Ganesh Devarajan
ICC
2007
IEEE
114views Communications» more  ICC 2007»
14 years 4 months ago
Two-Factor Localized Authentication Scheme for WLAN Roaming
- In the paper, we propose an efficient two-factor localized authentication scheme suitable for WLAN roaming. The proposed authentication scheme can greatly improve the security co...
Xiaodong Lin, Haojin Zhu, Pin-Han Ho, Xuemin Shen
ICPADS
2007
IEEE
14 years 4 months ago
Finding candidate spots for replica servers based on demand fluctuation
Many service providers distribute various kinds of content over the Internet. They often use replica servers to provide stable service. To position them appropriately, service pro...
Masato Asahara, Akio Shimada, Hiroshi Yamada, Kenj...
CEEMAS
2007
Springer
14 years 4 months ago
Collaborative Attack Detection in High-Speed Networks
We present a multi-agent system designed to detect malicious traffic in high-speed networks. In order to match the performance requirements related to the traffic volume, the net...
Martin Rehák, Michal Pechoucek, Pavel Celed...