Sciweavers

7383 search results - page 1477 / 1477
» Theories of information behavior
Sort
View
DM
1998
195views more  DM 1998»
13 years 5 months ago
On basis-exchange properties for matroids
We give a counterexample to a conjecture by Wild about binary matroids. We connect two equivalent lines of research in matroid theory: a simple type of basis-exchange property and ...
Joseph E. Bonin
WECWIS
2003
IEEE
205views ECommerce» more  WECWIS 2003»
13 years 10 months ago
Beyond "web of trust": Enabling P2P E-commerce
The huge success of eBay has proven the demand for customer-to-customer (C2C) electronic commerce. eBay is a centralized infrastructure with all its scalability problems (network ...
Anwitaman Datta, Manfred Hauswirth, Karl Aberer
ISI
2008
Springer
13 years 5 months ago
Real time intrusion prediction, detection and prevention programs
An Intrusion Detection Program (IDP) analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. In this talk, we p...
A. Abraham
« Prev « First page 1477 / 1477 Last » Next »