Sciweavers

446 search results - page 31 / 90
» Modeling trust in e-commerce: an approach based on user requ...
Sort
View
SMC
2007
IEEE
134views Control Systems» more  SMC 2007»
15 years 6 months ago
A Petri net-based approach to QoS-aware configuration for web services
: With the development of enterprise-wide and cross-enterprise application integration and interoperation towards web service, web service providers try to not only fulfill the fun...
PengCheng Xiong, Yushun Fan, MengChu Zhou
IJISEC
2006
108views more  IJISEC 2006»
14 years 12 months ago
How to obtain full privacy in auctions
Abstract Privacy has become a factor of increasing importance in auction design. We propose general techniques for cryptographic first-price and (M + 1)st-price auction protocols t...
Felix Brandt
COMPSAC
2009
IEEE
15 years 4 months ago
ELALPS: A Framework to Eliminate Location Anonymizer from Location Privacy Systems
—Countless challenges to preserving a user’s location privacy exist and have become more important than ever before with the proliferation of handheld devices and the pervasive...
Mehrab Monjur, Sheikh Iqbal Ahamed, Chowdhury Shar...
ER
2004
Springer
169views Database» more  ER 2004»
15 years 5 months ago
Intentional Modeling to Support Identity Management
Identity management has arisen as a major and urgent challenge for internet-based communications and information services. Internet services involve complex networks of relationshi...
Lin Liu, Eric S. K. Yu
TAP
2008
Springer
102views Hardware» more  TAP 2008»
14 years 11 months ago
A Logic-Based Approach to Combinatorial Testing with Constraints
Abstract. Usage of combinatorial testing is wide spreading as an effective technique to reveal unintended feature interaction inside a given system. To this aim, test cases are con...
Andrea Calvagna, Angelo Gargantini