Sciweavers

20024 search results - page 3631 / 4005
» Database Management Systems
Sort
View
CCS
2010
ACM
15 years 11 months ago
Bureaucratic protocols for secure two-party sorting, selection, and permuting
In this paper, we introduce a framework for secure two-party (S2P) computations, which we call bureaucratic computing, and we demonstrate its efficiency by designing practical S2P...
Guan Wang, Tongbo Luo, Michael T. Goodrich, Wenlia...
145
Voted
CCS
2010
ACM
15 years 11 months ago
A game theoretic model for digital identity and trust in online communities
Digital identity and trust management mechanisms play an important role on the Internet. They help users make decisions on trustworthiness of digital identities in online communit...
Tansu Alpcan, Cengiz Örencik, Albert Levi, Er...
ICDCN
2010
Springer
15 years 11 months ago
An Intelligent IT Infrastructure for the Future
The proliferation of new modes of communication and collaboration has resulted in an explosion of digital information. To turn this challenge into an opportunity, the IT industry ...
Prith Banerjee
158
Voted
TMA
2010
Springer
487views Management» more  TMA 2010»
15 years 11 months ago
End-to-End Available Bandwidth Estimation Tools, An Experimental Comparison
Abstract. The available bandwidth of a network path impacts the performance of many applications, such as VoIP calls, video streaming and P2P content distribution systems. Several ...
Emanuele Goldoni, Marco Schivi
APSCC
2009
IEEE
15 years 11 months ago
MORSE: A Model-Aware Service Environment
—In a number of scenarios, services generated using a model-driven development (MDD) approach could benefit from “reflective” access to the information in the models from w...
Ta'id Holmes, Uwe Zdun, Schahram Dustdar
« Prev « First page 3631 / 4005 Last » Next »