Sciweavers

1715 search results - page 230 / 343
» Trust and Reputation Systems
Sort
View
COMPSAC
1996
IEEE
15 years 2 months ago
Business Rule Extraction from Legacy Code
Business rules are operational rules that business organizationsfollow to peq%rm various activities. Over time, business rules evolve and the software that implemented them are al...
Hai Huang, Wei-Tek Tsai, Sourav Bhattacharya, Xiao...
ATAL
2006
Springer
15 years 1 months ago
Negotiating efficient outcomes over multiple issues
It is difficult to reach optimal outcomes in bilateral negotiations with multiple issues when the agents' preferences and priorities of the issues are not common knowledge. S...
Sabyasachi Saha, Sandip Sen
ICWS
2004
IEEE
14 years 11 months ago
Anonymizing Web Services through a Club Mechanism with Economic Incentives
Preserving privacy during Web transactions is a major concern for individuals and organizations. One of the solutions proposed in the literature is to maintain anonymity through gr...
Mamata Jenamani, Leszek Lilien, Bharat K. Bhargava
ISSA
2004
14 years 11 months ago
An Investigation Into Access Control For Mobile Devices
Mobile devices, such as mobile phones, are becoming multi-purpose devices. These devices are capable of storing data as well as running custom applications. As more people adopt t...
Stephen Perelson
CSREASAM
2009
14 years 11 months ago
A Service Framework based on Grades of IdPs and SPs
In Web services, a framework for the separation of authentication (IdP) and services (SP) has been proposed and actually deployed. In this framework, quality of information provide...
Sato Hiroyuki