Sciweavers

2940 search results - page 524 / 588
» Behavioral Constraints for Services
Sort
View
ATAL
2008
Springer
13 years 9 months ago
Mobile opportunistic commerce: mechanisms, architecture, and application
We present mechanisms, architectures, and an implementation addressing challenges with mobile opportunistic commerce centering on markets and mechanisms that support the procureme...
Ece Kamar, Eric Horvitz, Chris Meek
ESORICS
2008
Springer
13 years 9 months ago
Cryptographic Protocol Explication and End-Point Projection
Abstract. Cryptographic protocols are useful for engineering trust in transactions. There are several languages for describing these protocols, but these tend to capture the commun...
Jay A. McCarthy, Shriram Krishnamurthi
DIMVA
2004
13 years 9 months ago
Sensors for Detection of Misbehaving Nodes in MANETs
: The fact that security is a critical problem when implementing mobile ad hoc networks (MANETs) is widely acknowledged. One of the different kinds of misbehavior a node may exhibi...
Frank Kargl, Andreas Klenk, Michael Weber, Stefan ...
BMCBI
2007
113views more  BMCBI 2007»
13 years 8 months ago
CoryneRegNet 4.0 - A reference database for corynebacterial gene regulatory networks
Background: Detailed information on DNA-binding transcription factors (the key players in the regulation of gene expression) and on transcriptional regulatory interactions of micr...
Jan Baumbach
CE
2005
60views more  CE 2005»
13 years 7 months ago
Personalized e-learning system using Item Response Theory
Personalized service is important on the Internet, especially in Web-based learning. Generally, most personalized systems consider learner preferences, interests, and browsing beh...
Chih-Ming Chen, Hahn-Ming Lee, Ya-Hui Chen