Sciweavers

947 search results - page 173 / 190
» Information Security in Mobile Databases
Sort
View
86
Voted
LREC
2008
101views Education» more  LREC 2008»
15 years 1 months ago
The QALL-ME Benchmark: a Multilingual Resource of Annotated Spoken Requests for Question Answering
This paper presents the QALL-ME benchmark, a multilingual resource of annotated spoken requests in the tourism domain, freely available for research purposes. The languages curren...
Elena Cabrio, Milen Kouylekov, Bernardo Magnini, M...
ACMICEC
2004
ACM
171views ECommerce» more  ACMICEC 2004»
15 years 5 months ago
Efficient integration of web services with distributed data flow and active mediation
This paper presents a loosely coupled service-composition paradigm. This paradigm employs a distributed data flow that differs markedly from centralized information flow adopted b...
David Liu, Jun Peng, Kincho H. Law, Gio Wiederhold
98
Voted
WWW
2003
ACM
16 years 13 days ago
The Eigentrust algorithm for reputation management in P2P networks
Peer-to-peer file-sharing networks are currently receiving much attention as a means of sharing and distributing information. However, as recent experience shows, the anonymous, o...
Sepandar D. Kamvar, Mario T. Schlosser, Hector Gar...
ICPR
2004
IEEE
16 years 26 days ago
Competitive Coding Scheme for Palmprint Verification
There is increasing interest in the development of reliable, rapid and non-intrusive security control systems. Among the many approaches, biometrics such as palmprints provide hig...
Adams Wai-Kin Kong, David Zhang
RE
2001
Springer
15 years 4 months ago
The Role of Policy and Stakeholder Privacy Values in Requirements Engineering
Diverse uses of information technology (IT) in organizations affect privacy. Developers of electronic commerce, database management, security mechanisms, telecommunication and col...
Annie I. Antón, Julia Brande Earp, Thomas A...