Handcock, M.S., Raftery, A.E. and Tantrum, J. (2005).
Model-Based Clustering for Social Networks.
Working Paper no. 46, Center for Statistics and the Social Sciences,
University of Washington.
WiKID is a two-factor authentication system. It consists of: a PIN, stored in the user's head; a small, lightweight client that encapsulates the private/public keys; and a server that stores the public keys of the client's and the user's PIN. When the use
Y. Ahn, S. Han, H. Kwak, S. Moon, und H. Jeong. Abstract Book of the XXIII IUPAP International Conference on Statistical Physics, Genova, Italy, (9-13 July 2007)
S. Bush. Invited Paper: SFI Workshop: Resilient and Adaptive Defense of Computing
Networks 2003, Complexity and Inference, DIMACS Center, Rutgers University, Piscataway, NJ, (Juni 2003)
Y. Eom, C. Jeon, B. Kahng, und H. Jeong. Abstract Book of the XXIII IUPAP International Conference on Statistical Physics, Genova, Italy, (9-13 July 2007)
A. Dieberger, und M. Guzdial. From Usenet to CoWebs - Interacting with Social Information Spaces, Springer, London, Computer-Supported Cooperative Work.(2003)
B. Miller, J. Riedl, und J. Konstan. From Usenet to CoWebs - Interacting with Social Information Spaces, Springer, London, Computer-Supported Cooperative Work.(2003)
P. Martin, M. Blumenstein, und P. Deer. Proceedings of the 13th International Conference on Conceptual Structures (ICCS 2005), Volume 3596 von Lecture Notes in Computer Science, Seite 411-424. Springer, (2005)