Sciweavers

436 search results - page 17 / 88
» Arguing for gaining access to information
Sort
View
ESWS
2004
Springer
15 years 3 months ago
No Registration Needed: How to Use Declarative Policies and Negotiation to Access Sensitive Resources on the Semantic Web
Gaining access to sensitive resources on the Web usually involves an explicit registration step, where the client has to provide a predetermined set of information to the server. T...
Rita Gavriloaie, Wolfgang Nejdl, Daniel Olmedilla,...
CORR
2006
Springer
127views Education» more  CORR 2006»
14 years 12 months ago
Space Division Multiple Access with a Sum Feedback Rate Constraint
On a multiantenna broadcast channel, simultaneous transmission to multiple users by joint beamforming and scheduling is capable of achieving high throughput, which grows double log...
Kaibin Huang, Robert W. Heath Jr., Jeffrey G. Andr...
CCS
2005
ACM
15 years 5 months ago
Preventing attribute information leakage in automated trust negotiation
Automated trust negotiation is an approach which establishes trust between strangers through the bilateral, iterative disclosure of digital credentials. Sensitive credentials are ...
Keith Irwin, Ting Yu
AAAI
2006
15 years 1 months ago
Mechanisms for Partial Information Elicitation: The Truth, but Not the Whole Truth
We examine a setting in which a buyer wishes to purchase probabilistic information from some agent. The seller must invest effort in order to gain access to the information, and m...
Aviv Zohar, Jeffrey S. Rosenschein
ELPUB
2007
ACM
15 years 3 months ago
Openness in Higher Education: Open Source, Open Standards, Open Access
For national advisory services in the UK (UKOLN, CETIS, and OSS Watch), varieties of openness (open source software, open standards, and open access to research publications and d...
Brian Kelly, Scott Wilson, Randy Metcalfe