Sciweavers

1351 search results - page 224 / 271
» Trust in Anonymity Networks
Sort
View
ECIS
2001
14 years 11 months ago
The Impact of Social Issues on Internet Policy Making
The advantages that Internet as a new technology offers to business and individuals can't be fully exploited without taking under consideration a number of social issues that...
Anastasia Papazafeiropoulou, Athanasia Pouloudi
IJNSEC
2008
108views more  IJNSEC 2008»
14 years 9 months ago
Multiplicative Forward-Secure Threshold Signature Scheme
The devastating consequence of secret key exposure in digital signature is that any signature can be forged and cannot be trusted. To mitigate the damage of secret key exposure, f...
Sherman S. M. Chow, H. W. Go, Lucas Chi Kwong Hui,...
IJKL
2007
97views more  IJKL 2007»
14 years 9 months ago
Knowledge society arguments revisited in the semantic technologies era
: In the light of high profile governmental and international efforts to realise the knowledge society, I review the arguments made for and against it from a technology standpoint....
Yannis Kalfoglou
ATMOS
2008
101views Optimization» more  ATMOS 2008»
14 years 11 months ago
Robust Line Planning under Unknown Incentives and Elasticity of Frequencies
The problem of robust line planning requests for a set of origin-destination paths (lines) along with their traffic rates (frequencies) in an underlying railway network infrastruct...
Spyros C. Kontogiannis, Christos D. Zaroliagis
ICDM
2010
IEEE
111views Data Mining» more  ICDM 2010»
14 years 7 months ago
ValuePick: Towards a Value-Oriented Dual-Goal Recommender System
Given a user in a social network, which new friends should we recommend, the dual goal being to achieve user satisfaction and good network connectivity? Similarly, which new produc...
Leman Akoglu, Christos Faloutsos