Sciweavers

1988 search results - page 103 / 398
» Securing Information Transfer in Distributed Computing Envir...
Sort
View
GI
2001
Springer
15 years 7 months ago
Proactive Services in a Distributed Traffic Telematics Application
: The paper describes a mobile application for traffic telematics, based on the Jini middleware. The application is realized as a set of user-level services, characterized by follo...
Nils Gura, Albert Held, Jörg Kaiser
ACISP
2006
Springer
15 years 9 months ago
Towards Provable Security for Ubiquitous Applications
Abstract. The emergence of computing environments where smart devices are embedded pervasively in the physical world has made possible many interesting applications and has trigger...
Mike Burmester, Tri Van Le, Breno de Medeiros
PKDD
2007
Springer
214views Data Mining» more  PKDD 2007»
15 years 9 months ago
Multi-party, Privacy-Preserving Distributed Data Mining Using a Game Theoretic Framework
Abstract. Analysis of privacy-sensitive data in a multi-party environment often assumes that the parties are well-behaved and they abide by the protocols. Parties compute whatever ...
Hillol Kargupta, Kamalika Das, Kun Liu
USM
2000
15 years 6 months ago
Virtual Malls for Web Commerce: Observations and Case Study
In the real world there seem to be essential differences between shops, tourist offices, city halls, theatres and museums. However, when we try to design virtual environments allow...
Anton Nijholt
AGENTS
1998
Springer
15 years 7 months ago
A Multiagent Perspective of Parallel and Distributed Machine Learning
Parallel and distributed information processing systems play an increasingly important role in artificial intelligence and computer science. In this article an approach to learnin...
Gerhard Weiß