Sciweavers

384 search results - page 25 / 77
» Get another label
Sort
View
97
Voted
PET
2009
Springer
15 years 7 months ago
Privacy-Preserving Policy-Based Information Transfer
As the global society becomes more interconnected and more privacy-conscious, communication protocols must balance access control with protecting participants’ privacy. A common ...
Emiliano De Cristofaro, Stanislaw Jarecki, Jihye K...
111
Voted
FGCN
2007
IEEE
127views Communications» more  FGCN 2007»
15 years 7 months ago
A Survey of Routing Protocols for Energy Constrained Ad Hoc Wireless Networks
In this survey we review energy-aware routing protocols for wireless multihop ad hoc networks and critically discuss the main results in this area. The classification presented is...
Natalia Vassileva, Francisco Barceló-Arroyo
85
Voted
PRDC
2007
IEEE
15 years 7 months ago
Improving Email Reliability by Sender Retransmission
While email is fairly reliable, messages do get lost. This can be due to the store-and-forward nature of email, which passes responsibility for delivering email from one mail serv...
Tim Moors, Patrick Chu
102
Voted
CAISE
2007
Springer
15 years 7 months ago
Achieving trust in IT outsourcing relationships
IT outsourcing is a viable option for organizations to maintain competitiveness and get the ability to focus on core competences. However, there are risks, such as handing over sen...
Eva Söderström, Christian Lennerholt
91
Voted
ECWEB
2004
Springer
126views ECommerce» more  ECWEB 2004»
15 years 6 months ago
A Model for Multi-party Negotiations with Majority Rule
Our model of multi-party negotiations is a many parties, many issues model. The whole multi-party negotiation consists of a set of mutually influencing bilateral negotiations that...
Sheng Zhang, Fillia Makedon, James Ford, Lin Ai