Sciweavers

167 search results - page 26 / 34
» Information Security Economics - and Beyond
Sort
View
IJVR
2008
118views more  IJVR 2008»
14 years 9 months ago
Use of Technology Enhanced Education to Improve Teaching and Learning Process
The modern world continues to change as Information Technology (IT) related applications proceed to evolve at a rapid pace. The need for IT continues to grow as we begin to meaning...
Daniela Marghitu, Elizabeth Zylla-Jones, Santosh B...
IEEEIAS
2008
IEEE
15 years 4 months ago
Geolocation-Based Trust for Vanet's Privacy
: Research in Vehicular Ad Hoc NETworks (VANETs) has evolved considerably over the last years. Security and privacy in VANETs have recently appealed special interest in the researc...
Jetzabel Serna, Jesus Luna, Manel Medina
WWW
2004
ACM
15 years 10 months ago
Web accessibility: a broader view
Web accessibility is an important goal. However, most approaches to its attainment are based on unrealistic economic models in which Web content developers spend too much and rece...
John T. Richards, Vicki L. Hanson
SIGECOM
2005
ACM
169views ECommerce» more  SIGECOM 2005»
15 years 3 months ago
Online auctions with re-usable goods
This paper concerns the design of mechanisms for online scheduling in which agents bid for access to a re-usable resource such as processor time or wireless network access. Each a...
Mohammad Taghi Hajiaghayi, Robert D. Kleinberg, Mo...
81
Voted
DSS
2007
226views more  DSS 2007»
14 years 9 months ago
Dare to share: Protecting sensitive knowledge with data sanitization
chool of Business Research – FY 2007 Research Abstracts Dare to Share: Protecting Sensitive Knowledge with Data Sanitization Data sanitization is a process that is used to promot...
Ali Amiri