Sciweavers

744 search results - page 54 / 149
» The Traust Authorization Service
Sort
View
WWW
2003
ACM
15 years 10 months ago
Evolving the Semantic Web with Mangrove
Despite numerous proposals for its creation, the semantic web has yet to achieve widespread adoption. Recently, some researchers have argued that participation in the semantic web...
Luke McDowell, Oren Etzioni, Steven D. Gribble, Al...
NOMS
2008
IEEE
15 years 4 months ago
Towards an efficient implementation of traceback mechanisms in autonomous systems
—One of the major problems due to denial of service attacks is the identification of fault packets. To resolve this problem, several IP traceback methods have been defined. In th...
Karima Boudaoud, F. LeBorgne
WECWIS
2003
IEEE
111views ECommerce» more  WECWIS 2003»
15 years 3 months ago
A Prototype of Information Requirement Elicitation in m-Commerce
Information requirement elicitation (IRE) is a context-aware and personalized wireless web service to elicit user information requirements through interactive choice prompts. The ...
Jun (John) Sun, Hoh Peter In, Kuncara Aji Sukasdad...
PKC
2000
Springer
120views Cryptology» more  PKC 2000»
15 years 1 months ago
Optimally Efficient Accountable Time-Stamping
Abstract. Efficient secure time-stamping schemes employ a 2-level approach in which the time-stamping service operates in rounds. We say that a time-stamping service is accountable...
Ahto Buldas, Helger Lipmaa, Berry Schoenmakers
ISN
1995
Springer
15 years 1 months ago
Counting the Costs and Benefits of Metaphor
It has been demonstrated that the use of suitable metaphors in the user service interface can have a dramatic effect on the way in which the user perceives the services, depending ...
Chris Condon, Stephan Keuneke