Sciweavers

549 search results - page 87 / 110
» Belief-Based Risk Analysis
Sort
View
SWS
2006
ACM
15 years 5 months ago
Single sign-on for java web start applications using myproxy
Single sign-on is critical for the usability of distributed systems. While there are several authentication mechanisms which support single sign-on (e.g. Kerberos and X.509), it m...
Terry Fleury, Jim Basney, Von Welch
ICRA
2005
IEEE
140views Robotics» more  ICRA 2005»
15 years 5 months ago
Snake-Like Units Using Flexible Backbones and Actuation Redundancy for Enhanced Miniaturization
— This paper reports some recent analysis and modeling results obtained while developing a tele-robotic system for minimally invasive surgery of the throat. One of the main enabl...
Nabil Simaan
WECWIS
2005
IEEE
94views ECommerce» more  WECWIS 2005»
15 years 5 months ago
Electronic Trading in Order-Driven Markets: Efficient Execution
In this paper, we address the importance of efficient execution in electronic markets. Due to intense competition for profit opportunities, trading costs can represent a significa...
Yuriy Nevmyvaka, Michael S. Kearns, Amy Papandreou...
ISMIS
2005
Springer
15 years 5 months ago
Statistical Database Modeling for Privacy Preserving Database Generation
Abstract. Testing of database applications is of great importance. Although various studies have been conducted to investigate testing techniques for database design, relatively fe...
Xintao Wu, Yongge Wang, Yuliang Zheng
WINE
2005
Springer
109views Economy» more  WINE 2005»
15 years 5 months ago
New Algorithms for Mining the Reputation of Participants of Online Auctions
The assessment of credibility and reputation of contractors in online auctions is the key issue in providing reliable environment for customer-to-customer e-commerce. Confident re...
Mikolaj Morzy