Sciweavers

1974 search results - page 64 / 395
» Conditional Purchase Orders
Sort
View
91
Voted
FC
2004
Springer
129views Cryptology» more  FC 2004»
15 years 3 months ago
A Privacy-Friendly Loyalty System Based on Discrete Logarithms over Elliptic Curves
Abstract. Systems for the support of customer relationship management are becoming increasingly attractive for vendors. Loyalty systems provide an interesting possibility for vendo...
Matthias Enzmann, Marc Fischlin, Markus Schneider ...
AIWORC
2000
IEEE
15 years 2 months ago
Building Flexible Mobile Applications for Next Generation Enterprises
In order to understand and gain practical insights into various aspects of Next Generation Enterprises, we are building a testbed for flexible mobile applications. We started with...
Karun Karunanithi, Khurram Haneef, Bruno Cordioli,...
SIGOPSE
2000
ACM
15 years 2 months ago
Position paper: the role of platforms and operating systems in supporting home networks
As researchers look beyond the PC there is increasing interest in developing and deploying sophisticated home networks. Such networks might allow the seamless integration of infor...
Nigel Davies, Pierre-Guillaume Raverdy
INFOCOM
1994
IEEE
15 years 2 months ago
An Algorithm for Optimal Service Provisioning using Resource Pricing
We propose a microeconomic approach to service provisioning in ATM networks. Our provisioning procedure consists of two algorithms, one executed by the network and the other by in...
Steven H. Low, Pravin Varaiya
72
Voted
SP
2010
IEEE
212views Security Privacy» more  SP 2010»
15 years 2 months ago
State of the Art: Automated Black-Box Web Application Vulnerability Testing
—Black-box web application vulnerability scanners are automated tools that probe web applications for security vulnerabilities. In order to assess the current state of the art, w...
Jason Bau, Elie Bursztein, Divij Gupta, John C. Mi...