Sciweavers

480 search results - page 46 / 96
» Anonymous Transactions in Computer Networks
Sort
View
CSCW
2010
ACM
14 years 5 months ago
Warrants and deception in computer mediated communication
This article explores the operation of warrants, connections between online and real-world identities, on deceptive behavior in computer-mediated communication. A survey of 132 pa...
Darcy Warkentin, Michael Woodworth, Jeffrey T. Han...
ICDE
2004
IEEE
124views Database» more  ICDE 2004»
14 years 10 months ago
Authenticating Query Results in Edge Computing
Edge computing pushes application logic and the underlying data to the edge of the network, with the aim of improving availability and scalability. As the edge servers are not nec...
HweeHwa Pang, Kian-Lee Tan
SPW
2004
Springer
14 years 2 months ago
Privacy Is Linking Permission to Purpose
Abstract Fabio Massacci1 and Nicola Zannone1 Department of Information and Communication Technology University of Trento - Italy {massacci,zannone} at dit.unitn.it The last years h...
Fabio Massacci, Nicola Zannone
ADHOC
2007
104views more  ADHOC 2007»
13 years 8 months ago
Performance benchmarking of wireless Web servers
ct 8 The advent of mobile computers and wireless networks enables the deployment of wireless Web servers and clients in 9 short-lived ad hoc network environments, such as classroom...
Guangwei Bai, Kehinde Oladosu, Carey L. Williamson
PVLDB
2011
12 years 11 months ago
Albatross: Lightweight Elasticity in Shared Storage Databases for the Cloud using Live Data Migration
Database systems serving cloud platforms must serve large numbers of applications (or tenants). In addition to managing tenants with small data footprints, different schemas, and ...
Sudipto Das, Shoji Nishimura, Divyakant Agrawal, A...