Sciweavers

1733 search results - page 262 / 347
» Web Services: Distributed Applications Without Limits
Sort
View
DRM
2004
Springer
15 years 3 months ago
Analysis of an incentives-based secrets protection system
Once electronic content has been released it is very difficult to prevent copies of the content from being widely distributed. Such distribution can cause economic harm to the con...
N. Boris Margolin, Matthew Wright, Brian Neil Levi...
HICSS
2009
IEEE
138views Biometrics» more  HICSS 2009»
15 years 4 months ago
Designing an Intelligent Agent that Negotiates Tactfully with Human Counterparts: A Conceptual Analysis and Modeling Framework
Automated negotiation has attracted growing interest within fields such as e-business, multi-agent systems, and web services. Nevertheless, a majority of automated negotiation res...
Yinping Yang, Sharad Singhal
DRM
2007
Springer
15 years 4 months ago
Randomized radon transforms for biometric authentication via fingerprint hashing
We present a new technique for generating biometric fingerprint hashes, or summaries of information contained in human fingerprints. Our method calculates and aggregates various...
Mariusz H. Jakubowski, Ramarathnam Venkatesan
IJSNET
2010
114views more  IJSNET 2010»
14 years 8 months ago
Wireless sensor networks for soil science
Abstract: Wireless sensor networks can revolutionize soil ecology by providing measurements at temporal and spatial granularities previously impossible. This paper presents our fi...
Andreas Terzis, Razvan Musaloiu-Elefteri, Joshua C...
EDBT
2010
ACM
200views Database» more  EDBT 2010»
15 years 4 months ago
Rewrite techniques for performance optimization of schema matching processes
A recurring manual task in data integration, ontology alignment or model management is finding mappings between complex meta data structures. In order to reduce the manual effor...
Eric Peukert, Henrike Berthold, Erhard Rahm