Sciweavers

95 search results - page 12 / 19
» Managing Long Term Communications: Conversation and Contact ...
Sort
View
ACSAC
2010
IEEE
14 years 9 months ago
Keeping data secret under full compromise using porter devices
We address the problem of confidentiality in scenarios where the attacker is not only able to observe the communication between principals, but can also fully compromise the commu...
Christina Pöpper, David A. Basin, Srdjan Capk...
WWW
2008
ACM
16 years 10 days ago
How to influence my customers?: the impact of electronic market design
This paper investigates the strategic decisions of online vendors for offering different mechanism, such as sampling and online reviews of information products, to increase their ...
Nan Hu, Ling Liu, Bin Chen, Jialie Shen
MSWIM
2009
ACM
15 years 6 months ago
An enhanced mechanism for efficient assignment of multiple MBMS sessions towards LTE
The provision of rich multimedia services, such as Mobile TV, is considered of key importance for the Long Term Evolution (LTE) proliferation in mobile market. To this direction, ...
Antonios G. Alexiou, Christos Bouras, Vasileios Ko...
DMSN
2009
ACM
15 years 6 months ago
Validated cost models for sensor network queries
Generating a good execution plan for a declarative query has long been a central problem in data management research. With the rise in interest in wireless sensor networks (WSNs) ...
Christian Y. A. Brenninkmeijer, Ixent Galpin, Alva...
IFIP
2000
Springer
15 years 3 months ago
Information Systems Conceptual Foundations: Looking Backward and Forward
The academic field of information systems has developed because organizations use a specialized body of knowledge about information and communications systems. Teaching and resear...
Gordon B. Davis