Sciweavers

422 search results - page 52 / 85
» Risk management for distributed authorization
Sort
View
LOCA
2009
Springer
15 years 7 months ago
LOCK: A Highly Accurate, Easy-to-Use Location-Based Access Control System
With proliferation of ubiquitous computing, digital access is facing an increasing risk since unauthorized client located at any place may intrude a local server. Location Based Ac...
Yongcai Wang, Junhui Zhao, Toshikazu Fukushima
CDC
2008
IEEE
186views Control Systems» more  CDC 2008»
15 years 7 months ago
Continuous-time behavioral portfolio selection
This paper formulates and studies a general continuous-time behavioral portfolio selection model under Kahneman and Tversky's (cumulative) prospect theory, featuring S-shaped...
Hanqing Jin, Xun Yu Zhou
CSCW
2010
ACM
15 years 5 months ago
Sending mixed signals: multilevel reputation effects in peer-to-peer lending markets
Online peer-to-peer (P2P) lending organizations enable an individual to obtain an unsecured loan from a collection of individuals without the participation of a bank. Previous res...
Benjamin C. Collier, Robert Hampshire
133
Voted
MDM
2005
Springer
165views Communications» more  MDM 2005»
15 years 6 months ago
STEP: Self-Tuning Energy-safe Predictors
Data access prediction has been proposed as a mechanism to overcome latency lag, and more recently as a means of conserving energy in mobile systems. We present a fully adaptive p...
James Larkby-Lahet, Ganesh Santhanakrishnan, Ahmed...
98
Voted
EDO
2005
Springer
15 years 6 months ago
Experiences in coverage testing of a Java middleware
This paper addresses the issues of test coverage analysis of J2EE servers. These middleware are nowadays at the core of the modern information technology’s landscape. They provi...
Mehdi Kessis, Yves Ledru, Gérard Vandome