Sciweavers

706 search results - page 108 / 142
» Trust management for IPsec
Sort
View
JECR
2002
151views more  JECR 2002»
14 years 11 months ago
The Ethics of eBanking
In this paper we explore the ethics of business-to-business electronic commerce, with a focus on the banking sector. A case study of online foreign exchange developments at an inv...
Lisa Harris, Laura J. Spence
PSYCHNOLOGY
2008
112views more  PSYCHNOLOGY 2008»
14 years 11 months ago
Tags and the City
This paper analyzes the findings of a set of field studies that explored the use of near field communication (NFC) tags in a mixed reality environment for providing access to digi...
Minna Isomursu
TWC
2010
14 years 6 months ago
Efficient techniques for monitoring missing RFID tags
Abstract--As RFID tags become more widespread, new approaches for managing larger numbers of RFID tags will be needed. In this paper, we consider the problem of how to accurately a...
Chiu Chiang Tan, Bo Sheng, Qun Li
VLDB
2007
ACM
187views Database» more  VLDB 2007»
16 years 1 days ago
Secure Data Outsourcing
The networked and increasingly ubiquitous nature of today's data management services mandates assurances to detect and deter malicious or faulty behavior. This is particularly...
Radu Sion
WSDM
2010
ACM
213views Data Mining» more  WSDM 2010»
15 years 9 months ago
Corroborating Information from Disagreeing Views
We consider a set of views stating possibly conflicting facts. Negative facts in the views may come, e.g., from functional dependencies in the underlying database schema. We want ...
Alban Galland, Serge Abiteboul, Amélie Mari...