Sciweavers

2454 search results - page 253 / 491
» Privacy in the Information and Communications Technologies
Sort
View
116
Voted
CCS
2007
ACM
15 years 8 months ago
Improving vulnerability discovery models
Security researchers are applying software reliability models to vulnerability data, in an attempt to model the vulnerability discovery process. I show that most current work on t...
Andy Ozment
DRMTICS
2005
Springer
15 years 7 months ago
The Australian Sony PlayStation Case: How Far Will Anti-circumvention Law Reach in the Name of DRM?
This chapter overviews the legal issues arising from the modification of the Sony PlayStation console under Australian Copyright Law - the so called anti-circumvention provisions....
Brian Fitzgerald
91
Voted
WWW
2007
ACM
16 years 2 months ago
Collaborative ICT for Indian business clusters
Indian business clusters have contributed immensely to the country's industrial output, poverty alleviation and employment generation. However, with recent globalization thes...
Soumya Roy, Shantanu Biswas
SEMWEB
2004
Springer
15 years 7 months ago
Towards Automatic Discovery of Web Portals
Due to the problem of information overload, locating relevant Web portals precisely based on user requirements is quite an essential task. As the need for application-to-applicatio...
Haibo Yu, Tsunenori Mine, Makoto Amamiya
DATE
2003
IEEE
82views Hardware» more  DATE 2003»
15 years 7 months ago
Scaling into Ambient Intelligence
Envision the situation that high quality information and entertainment is easily accessible to anyone, anywhere, at any time, and on any device. How realistic is this vision? And ...
Twan Basten, Luca Benini, Anantha Chandrakasan, Me...