Sciweavers

1615 search results - page 59 / 323
» Dark application communities
Sort
View
IWDW
2005
Springer
15 years 4 months ago
A Survey of Watermarking Security
Digital watermarking studies have always been driven by the improvement of robustness. Most of articles of this field deal with this criterion, presenting more and more impressive...
Teddy Furon
ER
2004
Springer
104views Database» more  ER 2004»
15 years 4 months ago
Enterprise Modeling with Conceptual XML
An open challenge is to integrate XML and conceptual modeling in order to satisfy large-scale enterprise needs. Because enterprises typically have many data sources using differe...
David W. Embley, Stephen W. Liddle, Reema Al-Kamha
ACSAC
2003
IEEE
15 years 4 months ago
Forum Session: Security for Wireless Sensor Networks
Wireless networks of low-power sensing devices are poised to become a ubiquitous part of the computing landscape. Proposed applications of these networks range from health care to...
David Carman, Daniel Coffin, Bruno Dutertre, Vipin...
DBISP2P
2003
Springer
76views Database» more  DBISP2P 2003»
15 years 4 months ago
Trust-Aware Delivery of Composite Goods
Abstract. The vast majority of the interactions in typical online communities nowadays is between complete strangers. In such settings reputation reporting and trust management mod...
Magdalena Punceva, Karl Aberer
HICSS
1999
IEEE
98views Biometrics» more  HICSS 1999»
15 years 3 months ago
Collaborative Reputation Mechanisms in Electronic Marketplaces
The members of electronic communities are often unrelated to each other, they may have never met and have no information on each other's reputation. This kind of information ...
Giorgos Zacharia, Alexandros Moukas, Pattie Maes