Sciweavers

228 search results - page 26 / 46
» Ad Exchanges: Research Issues
Sort
View
CGF
1998
118views more  CGF 1998»
15 years 1 months ago
An Exhaustive Error-Bounding Algorithm for Hierarchical Radiosity
This paper presents a complete algorithm for the evaluation and control of error in radiosity calculations. Providing such control is both extremely important for industrial appli...
Nicolas Holzschuch, François X. Sillion
CSFW
2012
IEEE
13 years 3 months ago
Provably Secure and Practical Onion Routing
The onion routing network Tor is undoubtedly the most widely employed technology for anonymous web access. Although the underlying onion routing (OR) protocol appears satisfactory...
Michael Backes, Ian Goldberg, Aniket Kate, Esfandi...
CHI
2004
ACM
16 years 1 months ago
Safety-critical interaction: usability in incidents and accidents
Recent years have seen an increasing use of sophisticated interaction techniques in the field of command and control systems. The use of such techniques has been required in order...
Philippe A. Palanque, Floor Koornneef, Chris Johns...
NBIS
2009
Springer
15 years 5 months ago
Analysis of Web Alert Models
act— Web alerts are user-defined monitor conditions for public Internet information in which notification messages are sent to users whenever their alert conditions are met. The ...
Jameela Al-Jaroodi, Nader Mohamed
ECIS
2004
15 years 2 months ago
Inter-organizational knowledge management systems: typology and cases
Although companies are more and more developing complex networks of connections with their partners and customers and shifting their focus towards expanding the knowledge manageme...
Kostas Kafentzis, Dimitris Apostolou, Gregoris Men...