Sciweavers

1822 search results - page 294 / 365
» GENI Design Principles
Sort
View
142
Voted
ESAW
2008
Springer
15 years 5 months ago
Sensitive Data Transaction in Hippocratic Multi-Agent Systems
The current evolution of Information Technology leads to the increase of automatic data processing over multiple information systems. The data we deal with concerns sensitive infor...
Ludivine Crépin, Yves Demazeau, Olivier Boi...
115
Voted
FPLAY
2008
15 years 5 months ago
Using conflict theory to model complex societal interactions
Conflict theory can be used to explain the interactions between societies during times of turmoil and change (i.e. revolutions, strikes or everyday debates). Games have been produ...
Ben Medler, Joe Fitzgerald, Brian Magerko
163
Voted
FSE
2008
Springer
177views Cryptology» more  FSE 2008»
15 years 5 months ago
MD4 is Not One-Way
MD4 is a hash function introduced by Rivest in 1990. It is still used in some contexts, and the most commonly used hash function (MD5, SHA-1, SHA-2) are based on the design princip...
Gaëtan Leurent
150
Voted
ACSW
2007
15 years 5 months ago
The motivation and proposition of a privacy-enhancing architecture for operational databases
To date, research has focussed on privacy from a wide perspective, enabling organisations to implement various technologies that contribute to privacy protection. However, in such...
Kirsten Wahlstrom, Gerald Quirchmayr
AVI
2010
15 years 5 months ago
A community based metaphor supporting EUD within communities
The paper proposes an approach to EUD focusing on communities: on the one hand, users are considered as a community of cooperating actors; on the other hand, applications and devi...
Marco P. Locatelli, Carla Simone