Part II: Paper c: Skeletons, Roofs, and the Medial Axis Joseph ORourke Smith College.
An Analysis of Social Network-Based Sybil Defenses Sybil Defender Sybil examples Wei Wei ∗, Fengyuan Xu ∗, Chiu C. Tan†, Qun Li ∗ ∗ The College of William.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
Trust-Level Based Authentication Services in Mobile Ad Hoc Networks MPhil Term 2 Presentation (Spring 2003) by Edith Ngai Advisor: Prof. Michael R. Lyu.
Recursive Graph Deduction and Reachability Queries Yangjun Chen Dept. Applied Computer Science, University of Winnipeg 515 Portage Ave. Winnipeg, Manitoba,
Edith C.H. Ngai and Michael R. Lyu
Fast and practical indexing and querying of very large graphs Silke Triβl, Ulf Leser Humboldt-Universitat zu Berlin Presenter: Liwen Sun (Stephen) SIGMOD’07.