Sciweavers

2022 search results - page 316 / 405
» Trust in Multi-Agent Systems
Sort
View
HICSS
2008
IEEE
103views Biometrics» more  HICSS 2008»
15 years 6 months ago
Great Scrums Need Great Product Owners: Unbounded Collaboration and Collective Product Ownership
Scrum describes a separation of roles; the product owner is accountable for achieving business objectives and the team for technical execution. A pragmatic and collegial relations...
Ken H. Judy, Ilio Krumins-Beens
73
Voted
HICSS
2008
IEEE
93views Biometrics» more  HICSS 2008»
15 years 6 months ago
An Exploration of the Hygiene and Motivator Aspects of WebQual Constructs in Predicting Website Reuse
Most existing studies of website characteristics and their impact on intentions have assumed a linear relationship between them. However, motivational theories suggest that while ...
Ben Q. Liu, Dale Goodhue
WIMOB
2008
IEEE
15 years 6 months ago
Random Beacon for Privacy and Group Security
Abstract—Most contemporary security mechanisms and protocols include exchange of random or time-variant nonces as an essential means of protection against replay and other threat...
Aleksi Saarela, Jan-Erik Ekberg, Kaisa Nyberg
126
Voted
WIMOB
2008
IEEE
15 years 6 months ago
A Protocol for Pervasive Distributed Computing Reliability
Abstract—The adoption of new hardware and software architectures will make future generations of pervasive devices more flexible and extensible. Networks of computational nodes ...
Alberto Ferrante, Roberto Pompei, Anastasia Stulov...
ACSAC
2007
IEEE
15 years 6 months ago
Centralized Security Labels in Decentralized P2P Networks
This paper describes the design of a peer-to-peer network that supports integrity and confidentiality labeling of shared data. A notion of data ownership privacy is also enforced...
Nathalie Tsybulnik, Kevin W. Hamlen, Bhavani M. Th...