Sciweavers

WMC
2004
224views ECommerce» more  WMC 2004»
13 years 11 months ago
Evaluation Framework for a Mobile Marketing Application in 3rd Generation Networks
: Testing of a software application serves the accomplishment of two dis tinct objectives: ensuring functionality and end-user acceptance. However, with an increasing desire for mo...
Franz Lehner, Eva-Maria Sperger, Holger Nösek...
EGCDMAS
2004
147views ECommerce» more  EGCDMAS 2004»
13 years 11 months ago
Should We Prove Security Policies Correct?
Security policies are abstract descriptions of how a system should behave to be secure. They typically express what is obligatory, permitted, or forbidden in the system. When the s...
Sebastiano Battiato, Giampaolo Bella, Salvatore Ri...
SIGECOM
2004
ACM
120views ECommerce» more  SIGECOM 2004»
14 years 3 months ago
Robust incentive techniques for peer-to-peer networks
Lack of cooperation (free riding) is one of the key problems that confronts today’s P2P systems. What makes this problem particularly difficult is the unique set of challenges ...
Michal Feldman, Kevin Lai, Ion Stoica, John Chuang
EGCDMAS
2004
135views ECommerce» more  EGCDMAS 2004»
13 years 11 months ago
Multiple electronic signatures on multiple documents
European, international and Internet standards are available to support electronic signatures. The most common signature formats are defined via the ASN.1 syntax with DER encoding,...
Antonio Lioy, Gianluca Ramunno
ACMICEC
2004
ACM
171views ECommerce» more  ACMICEC 2004»
14 years 3 months ago
Efficient integration of web services with distributed data flow and active mediation
This paper presents a loosely coupled service-composition paradigm. This paradigm employs a distributed data flow that differs markedly from centralized information flow adopted b...
David Liu, Jun Peng, Kincho H. Law, Gio Wiederhold
ECommerce
Top of PageReset Settings