Sciweavers

1229 search results - page 159 / 246
» Trusted Computing
Sort
View
WWW
2008
ACM
14 years 9 months ago
Guanxi in the chinese web - a study of mutual linking
Guanxi is a type of dyadic social interaction based on feelings ("qing") and trust ("xin"). Long studied by scholars of Chinese origin, it has recently drawn t...
Valerie King, Louis Lei Yu, Yan Zhuang
WWW
2007
ACM
14 years 9 months ago
Ontology engineering using volunteer labor
We describe an approach designed to reduce the costs of ontology development through the use of untrained, volunteer knowledge engineers. Results are provided from an experiment i...
Benjamin M. Good, Mark D. Wilkinson
PODS
2005
ACM
147views Database» more  PODS 2005»
14 years 9 months ago
Peer data exchange
Abstract. We present a semantics and answer set programs for relational peer data exchange systems. When a peer answers a query, it exchanges data with other peers in order to supp...
Ariel Fuxman, Phokion G. Kolaitis, Renée J....
PERCOM
2004
ACM
14 years 8 months ago
"Yoking-Proofs" for RFID Tags
RFID (Radio-Frequency Identification) tags are small, inexpensive microchips capable of transmitting unique identifiers wirelessly over a short distance. Thanks to their utility i...
Ari Juels
IDTRUST
2009
ACM
14 years 3 months ago
Personal identity verification (PIV) cards as federated identities: challenges and opportunities
In this paper, we describe the challenges in using Personal Identity Verification (PIV) cards and PIV-like cards as federated identities to authenticate to US Federal government f...
Sarbari Gupta