Sciweavers

1573 search results - page 211 / 315
» Strong User Authentication
Sort
View
INFOCOM
2011
IEEE
14 years 5 months ago
A prior-free revenue maximizing auction for secondary spectrum access
—Dynamic spectrum allocation has proven promising for mitigating the spectrum scarcity problem. In this model, primary users lease chunks of under-utilized spectrum to secondary ...
Ajay Gopinathan, Zongpeng Li
CHI
2003
ACM
16 years 2 months ago
Interpersonal cues and consumer trust in e-commerce
E-commerce stretches interactions over space and time, and thus requires more trust than traditional shopping. Current approaches to building trust in e-commerce focus on cognitiv...
Jens Riegelsberger
SIGMOD
2007
ACM
122views Database» more  SIGMOD 2007»
16 years 1 months ago
XQuery layers
XML is the data interoperability standard in many application domains. Therefore, an increasing number of researchers and professionals, who are not computer scientists (although ...
Daniele Braga, Alessandro Campi, Stefano Ceri, Pao...

Publication
107views
15 years 11 months ago
RATC: A Robust Automated Tag Clustering Technique
Abstract. Nowadays, the most dominant and noteworthy web information sources are developed according to the collaborative-web paradigm, also known as Web 2.0. In particular, it rep...
Ludovico Boratto, Salvatore Carta, Eloisa Vargiu
SIGCOMM
2009
ACM
15 years 8 months ago
Delegating network security with more information
Network security is gravitating towards more centralized control. Strong centralization places a heavy burden on the administrator who has to manage complex security policies and ...
Jad Naous, Ryan Stutsman, David Mazières, N...