Sciweavers

373 search results - page 66 / 75
» Trustworthy Information: Concepts and Mechanisms
Sort
View
ER
2004
Springer
169views Database» more  ER 2004»
14 years 1 months ago
Intentional Modeling to Support Identity Management
Identity management has arisen as a major and urgent challenge for internet-based communications and information services. Internet services involve complex networks of relationshi...
Lin Liu, Eric S. K. Yu
CN
2006
85views more  CN 2006»
13 years 7 months ago
A scalable and decentralized fast-rerouting scheme with efficient bandwidth sharing
This paper focuses on the protection of virtual circuits (Label Switched Paths, LSPs) in a (G)MPLS (Generalised Multi-Protocol Label Switching) network. The proposed algorithm is ...
Simon Balon, Laurent Mélon, Guy Leduc
SIGIR
2008
ACM
13 years 7 months ago
Knowledge transformation from word space to document space
In most IR clustering problems, we directly cluster the documents, working in the document space, using cosine similarity between documents as the similarity measure. In many real...
Tao Li, Chris H. Q. Ding, Yi Zhang 0005, Bo Shao
ICDCS
2011
IEEE
12 years 7 months ago
E-Shadow: Lubricating Social Interaction Using Mobile Phones
—In this paper, we propose E-Shadow, a distributed mobile phone-based local social networking system. E-Shadow has two main components: (1) Local profiles. They enable EShadow u...
Jin Teng, Boying Zhang, Xinfeng Li, Xiaole Bai, Do...
CVPR
1996
IEEE
1457views Computer Vision» more  CVPR 1996»
14 years 9 months ago
Edge Detection and Ridge Detection with Automatic Scale Selection
When computing descriptors of image data, the type of information that can be extracted may be strongly dependent on the scales at which the image operators are applied. This arti...
Tony Lindeberg