Sciweavers

2795 search results - page 310 / 559
» Recommended or Not
Sort
View
99
Voted
ICISC
2001
156views Cryptology» more  ICISC 2001»
15 years 2 months ago
A Distributed Light-Weight Authentication Model for Ad-hoc Networks
Abstract. In this work we present a security model for low-value transactions in ad-hoc networks in which we focus on authentication since this is the core requirement for commerci...
André Weimerskirch, Gilles Thonet
78
Voted
ECIR
2003
Springer
15 years 2 months ago
Attaining Fast and Successful Searches in E-commerce Environments
Current online stores suffer from a cardinal problem. There are too many products to offer, and customers find themselves lost due to the vast selection. As opposed to traditional ...
Raz Lin, Sarit Kraus, Jeffrey D. Tew
ECIS
2003
15 years 2 months ago
Analysis of interrelations between business models and knowledge management strategies in consulting firms
Knowledge is an important matter for consulting firms − as a resource, as a product or service, and as a trigger for internal value creation processes. Therefore, a strategy for...
Sven Grolik, Dirk Kalmring, Dietrich Lehner, Chiar...
LWA
2004
15 years 2 months ago
The Personal Reader: A Framework for Enabling Personalization Services on the Semantic Web
The Personal Reader1 provides a framework for designing, implementing and maintaining web content readers, which provide personalized enrichment of web content for each individual...
Nicola Henze, Marc Herrlich
108
Voted
NETWORKING
2004
15 years 2 months ago
Detecting and Blocking Unauthorized Access in Wi-Fi Networks
Abstract. Academic and commercial 802.11 hotspots often use an SSLsecured captive portal to authenticate clients. Captive portals provide good usability and interoperability, but p...
Haidong Xia, José Carlos Brustoloni