Sciweavers

220 search results - page 31 / 44
» Trusted business system model using context sensitiveness
Sort
View
ICBA
2004
Springer
197views Biometrics» more  ICBA 2004»
14 years 1 months ago
Maximum Likelihood and Maximum a Posteriori Adaptation for Distributed Speaker Recognition Systems
We apply the ETSI’s DSR standard to speaker verification over telephone networks and investigate the effect of extracting spectral features from different stages of the ETSI...
Chin-Hung Sit, Man-Wai Mak, Sun-Yuan Kung
WWW
2009
ACM
14 years 8 months ago
All your contacts are belong to us: automated identity theft attacks on social networks
Social networking sites have been increasingly gaining popularity. Well-known sites such as Facebook have been reporting growth rates as high as 3% per week [5]. Many social netwo...
Leyla Bilge, Thorsten Strufe, Davide Balzarotti, E...
CSE
2009
IEEE
14 years 2 months ago
Private Buddy Search: Enabling Private Spatial Queries in Social Networks
—With the abundance of location-aware portable devices such as cellphones and PDAs, a new emerging application is to use this pervasive computing platform to learn about the wher...
Ali Khoshgozaran, Cyrus Shahabi
CLEIEJ
2010
13 years 5 months ago
Professional Training Program Management through Holonic Networks
Holonic networks constitute a type of organizational structures widely used at manufacturing enterprises. In an educational context, however, this type of structures remains practi...
Jonas Montilva C., Milagro Rivero, Judith Barrios ...
OTM
2005
Springer
14 years 1 months ago
Document Flow Model: A Formal Notation for Modelling Asynchronous Web Services Composition
This paper presents a formal notation for modelling asynchronous web services composition, using context and coordination mechanisms. Our notation specifies the messages that can b...
Jingtao Yang, Corina Cîrstea, Peter Henderso...