Sciweavers

10950 search results - page 2032 / 2190
» Future wireless networks
Sort
View
87
Voted
HUC
2007
Springer
15 years 7 months ago
Privacy Enhancing Technologies for RFID in Retail- An Empirical Investigation
This article investigates the conflicting area of user benefits arising through item level RFID tagging and a desire for privacy. It distinguishes between three approaches feasible...
Sarah Spiekermann
MABS
2007
Springer
15 years 7 months ago
Trust-Based Inter-temporal Decision Making: Emergence of Altruism in a Simulated Society
This paper contributes to the analysis of the question how altruistic behaviour can be in an agent’s own interest. The question is addressed by involving a temporal dimension in ...
Tibor Bosse, Martijn C. Schut, Jan Treur, David We...
152
Voted
PET
2007
Springer
15 years 6 months ago
Nymble: Anonymous IP-Address Blocking
Abstract. Anonymizing networks such as Tor allow users to access Internet services privately using a series of routers to hide the client’s IP address from the server. Tor’s su...
Peter C. Johnson, Apu Kapadia, Patrick P. Tsang, S...
94
Voted
ICDCSW
2006
IEEE
15 years 6 months ago
Fault-Tolerance Verification of the Fluids and Combustion Facility of the International Space Station
The Fluids and Combustion Facility (FCF) will be a permanent modular, multi-user facility used to accommodate microgravity science experiments in the U.S. Laboratory Module onboar...
Raquel S. Whittlesey-Harris, Mikhail Nesterenko
96
Voted
IEEEARES
2006
IEEE
15 years 6 months ago
Fair Trading of Information: A Proposal for the Economics of Peer-to-Peer Systems
A P2P currency can be a powerful tool for promoting exchanges in a trusted way that make use of under-utilized resources both in computer networks and in real life. There are thre...
Kenji Saito, Eiichi Morino, Jun Murai
« Prev « First page 2032 / 2190 Last » Next »