Sciweavers

15254 search results - page 2986 / 3051
» A k
Sort
View
JTAER
2010
109views more  JTAER 2010»
14 years 8 months ago
A Flexible Architecture for Privacy-Aware Trust Management
In service-oriented systems a constellation of services cooperate, sharing potentially sensitive information and responsibilities. Cooperation is only possible if the different pa...
Klemens Böhm, Sandro Etalle, Jerry den Hartog...
JUCS
2010
124views more  JUCS 2010»
14 years 8 months ago
Performance Optimizations for DAA Signatures on Java enabled Platforms
: With the spreading of embedded and mobile devices, public-key cryptography has become an important feature for securing communication and protecting personal data. However, the c...
Kurt Dietrich, Franz Röck
MANSCI
2010
105views more  MANSCI 2010»
14 years 8 months ago
Revenue Management with Strategic Customers: Last-Minute Selling and Opaque Selling
Companies in a variety of industries (e.g., airlines, hotels, theaters) often use last-minute sales to dispose of unsold capacity. Although this may generate incremental revenues ...
Kinshuk Jerath, Serguei Netessine, Senthil K. Veer...
MANSCI
2010
94views more  MANSCI 2010»
14 years 8 months ago
Contracting for Infrequent Restoration and Recovery of Mission-Critical Systems
Firms that rely on functioning mission-critical equipment for their businesses cannot a¤ord signi…cant operational downtime due to system disruptions. To minimize the impact of...
Sang-Hyun Kim, Morris A. Cohen, Serguei Netessine,...
MEDIAFORENSICS
2010
14 years 8 months ago
Biometric template transformation: a security analysis
One of the critical steps in designing a secure biometric system is protecting the templates of the users that are stored either in a central database or on smart cards. If a biom...
Abhishek Nagar, Karthik Nandakumar, Anil K. Jain
« Prev « First page 2986 / 3051 Last » Next »