Sciweavers

HOTOS
2003
IEEE
13 years 10 months ago
Privacy-Aware Location Sensor Networks
Advances in sensor networking and location tracking technology enable location-based applications but they also create significant privacy risks. Privacy is typically addressed t...
Marco Gruteser, Graham Schelle, Ashish Jain, Richa...
HICSS
2003
IEEE
88views Biometrics» more  HICSS 2003»
13 years 10 months ago
Modeling Growth of Cellular Services in India: A Systems Dynamics Approach
The cellular industry all over the world has been witnessing very high growth rates in subscriber base in recent years. For developing countries in particular, cellular services a...
Amitava Dutta, Varadharajan Sridhar
MMB
2004
Springer
142views Communications» more  MMB 2004»
13 years 10 months ago
Trends and Developments in ICT Industry: New Challenges for Performance Analysts
In the next few years the landscape of the information and communications technology (ICT) industry will be subject to many changes. New and advanced ICT services will be brought ...
Robert D. van der Mei, Bart Gijsen
IPOM
2005
Springer
13 years 10 months ago
Towards an Autonomic Service Architecture
Abstract. Traditional telecommunications service providers are undergoing a transition to a shared infrastructure in which multiple services will be offered to customers. These se...
Ramy Farha, Myung-Sup Kim, Alberto Leon-Garcia, Ja...
ACISP
2005
Springer
13 years 10 months ago
Security Analysis and Fix of an Anonymous Credential System
Anonymous credentials are an important privacy-enhancing technique that allows users to convince a service provider of their legitimacy for service accesses in an anonymous manner....
Yanjiang Yang, Feng Bao, Robert H. Deng
ICDE
2005
IEEE
124views Database» more  ICDE 2005»
13 years 10 months ago
SemCrypt - Ensuring Privacy of Electronic Documents Through Semantic-Based Encrypted Query Processing
The trend towards outsourcing increases the number of documents stored at external service providers. This storage model, however, raises privacy and security concerns because the...
Michael Schrefl, Katharina Grün, Jürgen ...
HICSS
2005
IEEE
109views Biometrics» more  HICSS 2005»
13 years 10 months ago
Staffing Software Maintenance and Support Projects
In the past decade outsourcing a software system’s support and maintenance has become relatively common across most organizations. In this paper we consider a few issues governi...
Jai Asundi, Sumit Sarkar
EEE
2005
IEEE
13 years 10 months ago
From Education to e-Learning : A Union Catalog Service of Learning Resources
Computer-Supported Collaborative Learning (CSCL) is a new learning method that is receiving an increasing amount of attention in Taiwan. With the rapid growth in learning resource...
Pei-Xian Kuo, Jyun-Jie Yan, Jan-Ming Ho
MINENET
2006
ACM
13 years 10 months ago
Privacy-preserving performance measurements
Internet performance is an issue of great interest, but it is not trivial to measure. A number of commercial companies try to measure this, as does RIPE, and many individual Inter...
Matthew Roughan, Yin Zhang
IPCCC
2006
IEEE
13 years 10 months ago
Unstructured peer-to-peer session over IP using SIP
— Data and telephone service providers have started considering migration to an IP based environment. This paper presents an unstructured peer-to-peer approach to initiating and ...
Khashayar Khavari, Chuen Liang, Ali Tizghadam, Far...