Sciweavers

577 search results - page 83 / 116
» Budget Feasible Mechanisms
Sort
View
MATA
2005
Springer
146views Communications» more  MATA 2005»
15 years 5 months ago
Distributed Authorization Framework for Mobile Agents
Abstract. Mobile agent systems provide new perspectives for distributed e-commerce applications. These applications may present specific restrictions, making mobile agent systems ...
Guillermo Navarro, Jose A. Ortega-Ruiz, Joan Ametl...
PCM
2005
Springer
288views Multimedia» more  PCM 2005»
15 years 5 months ago
Adaptive Deinterlacing for Real-Time Applications
In general, motion compensated (MC) deinterlacing algorithms can outperform non-MC (NMC) ones. However, we often prefer to choose the latter due to the considerations of error prop...
Qian Huang, Wen Gao, Debin Zhao, Huifang Sun
VLDB
2005
ACM
151views Database» more  VLDB 2005»
15 years 5 months ago
Query Execution Assurance for Outsourced Databases
In this paper we propose and analyze a method for proofs of actual query execution in an outsourced database framework, in which a client outsources its data management needs to a...
Radu Sion
CAISE
2004
Springer
15 years 5 months ago
Goal-Driven Analysis of Process Model Validity
Business process modeling and design, which has attracted much attention in recent years, emphasizes mainly graphical representation, usually without an underlying theory. The lack...
Pnina Soffer, Yair Wand
ISCIS
2004
Springer
15 years 5 months ago
Relay Attacks on Bluetooth Authentication and Solutions
We describe relay attacks on Bluetooth authentication protocol. The aim of these attacks is impersonation. The attacker does not need to guess or obtain a common secret known to bo...
Albert Levi, Erhan Çetintas, Murat Aydos, &...