Sciweavers

135 search results - page 27 / 27
» On Fair Electronic Cash
Sort
View
CISC
2005
Springer
109views Cryptology» more  CISC 2005»
13 years 11 months ago
Enforcing Email Addresses Privacy Using Tokens
We propose a system which allows users to monitor how their email addresses are used and how they spread over the Internet. This protects the privacy of the user and can reduce the...
Roman Schlegel, Serge Vaudenay
HICSS
2003
IEEE
174views Biometrics» more  HICSS 2003»
13 years 10 months ago
XyberScout: A Platform for the Efficient Construction of Mobile Location Aware Information Systems
For many years mobile visitor information systems for museums or exhibitions are a topic of research. Research prototypes aim to provide the user with powerful means for organizin...
Gerald Bieber, Rüdiger Ide
ELPUB
1999
ACM
13 years 9 months ago
Online Publishing as a Support for Scholarly Communication in Dynamic Knowledge Communities
Internet based services, particularly asynchronous communication services, offer an environment suited to the rise of knowledge communities. Knowledge communities, or invisible co...
Ana Alice Baptista, Elóy Rodrigues, Altamir...
IADIS
2004
13 years 7 months ago
Online and traditional (blended) delivery on a course: a comparative study
The three-year comparative study analyses progress made by students (of similar academic aptitude) on the same undergraduate level module delivered via traditional blended and onl...
Samia Kamal
INFOCOM
2010
IEEE
13 years 4 months ago
Enabling a Bufferless Core Network Using Edge-to-Edge Packet-Level FEC
— Internet traffic is expected to grow phenomenally over the next five to ten years, and to cope with such large traffic volumes, core networks are expected to scale to capaci...
Arun Vishwanath, Vijay Sivaraman, Marina Thottan, ...