Sciweavers

1176 search results - page 182 / 236
» Distributed Selective Dissemination of Information
Sort
View
FC
2005
Springer
87views Cryptology» more  FC 2005»
15 years 3 months ago
Protecting Secret Data from Insider Attacks
We consider defenses against confidentiality and integrity attacks on data following break-ins, or so-called intrusion resistant storage technologies. We investigate the problem o...
David Dagon, Wenke Lee, Richard J. Lipton
FC
2005
Springer
120views Cryptology» more  FC 2005»
15 years 3 months ago
Achieving Fairness in Private Contract Negotiation
Abstract. Suppose Alice and Bob are two entities (e.g. agents, organizations, etc.) that wish to negotiate a contract. A contract consists of several clauses, and each party has ce...
Keith B. Frikken, Mikhail J. Atallah
ACMICEC
2004
ACM
125views ECommerce» more  ACMICEC 2004»
15 years 3 months ago
A web-based consumer-oriented intelligent decision support system for personalized e-services
Due to the rapid advancement of electronic commerce and web technologies in recent years, the concepts and applications of decision support systems have been significantly extende...
Chien-Chih Yu
UIALL
2004
Springer
15 years 3 months ago
A Framework for Context-Sensitive Coordination of Human Interruptions in Human-Computer Interaction
Abstract. Recent trends in software development directed toward intelligence, distribution, and mobility need to be followed by an increased sophistication in user interface design...
Sonja Gievska, John L. Sibert
INEX
2009
Springer
15 years 2 months ago
Overview of the INEX 2009 Link the Wiki Track
In the third year of the Link the Wiki track, the focus has been shifted to anchor-to-bep link discovery. The participants were encouraged to utilize different technologies to reso...
Darren Wei Che Huang, Shlomo Geva, Andrew Trotman