Sciweavers

165 search results - page 27 / 33
» An Investigation on Using Web Services for Micro-Payment
Sort
View
BPSC
2009
184views Business» more  BPSC 2009»
13 years 8 months ago
Generating WS-SecurityPolicy Documents via Security Model Transformation
Abstract: When SOA-based business processes are to be enhanced with security properties, the model-driven business process development approach enables an easier and more reliable ...
Meiko Jensen
WWW
2008
ACM
14 years 8 months ago
A Study of User Profile Generation from Folksonomies
Recommendation systems which aim at providing relevant information to users are becoming more and more important and desirable due to the enormous amount of information available ...
Ching-man Au Yeung, Nicholas Gibbins, Nigel Shadbo...
ICEIS
2002
IEEE
14 years 20 days ago
Modeling Relational Data by the Adjacency Model
: The World-Wide-Web contains data that cannot be constrained by a schema. Another source for such data is heterogenous corporate systems which are integrated in order to get bette...
Jari Töyli, Matti Linna, Merja Wanne
RECSYS
2010
ACM
13 years 8 months ago
Global budgets for local recommendations
We present the design, implementation and evaluation of a new geotagging service, Gloe, that makes it easy to find, rate and recommend arbitrary on-line content in a mobile settin...
Thomas Sandholm, Hang Ung, Christina Aperjis, Bern...
ICICS
2005
Springer
14 years 1 months ago
Remotely Keyed Cryptographics Secure Remote Display Access Using (Mostly) Untrusted Hardware
Software that covertly monitors a user’s actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and remov...
Debra L. Cook, Ricardo A. Baratto, Angelos D. Kero...