Sciweavers

5333 search results - page 950 / 1067
» Business
Sort
View
136
Voted
CCS
2011
ACM
14 years 4 months ago
How to break XML encryption
XML Encryption was standardized by W3C in 2002, and is implemented in XML frameworks of major commercial and open-source organizations like Apache, redhat, IBM, and Microsoft. It ...
Tibor Jager, Somorovsky Juraj
CYBERC
2011
143views more  CYBERC 2011»
14 years 4 months ago
Opportunities and Challenges in Running Scientific Workflows on the Cloud
— Cloud computing is gaining tremendous momentum in both academia and industry. The application of Cloud computing, however, has mostly focused on Web applications and business a...
Yong Zhao, Xubo Fei, Ioan Raicu, Shiyong Lu
ECWEB
2011
Springer
277views ECommerce» more  ECWEB 2011»
14 years 4 months ago
Trust-Based Selection of Partners
The community of multi-agent systems has been studying ways to improve the selection of partner agents for joint action. One of such approaches consists in estimating the trustwort...
Joana Urbano, Ana Paula Rocha, Eugénio C. O...
ICDCS
2011
IEEE
14 years 4 months ago
Understanding the Network and User-Targeting Properties of Web Advertising Networks
—Advertising has become an integral and inseparable part of the World Wide Web. However, neither public auditing nor monitoring mechanisms still exist in this emerging area. In t...
Yong Wang, Daniel Burgener, Aleksandar Kuzmanovic,...
ICCV
2009
IEEE
16 years 9 months ago
Modelling Activity Global Temporal Dependencies using Time Delayed Probabilistic Graphical Model
We present a novel approach for detecting global behaviour anomalies in multiple disjoint cameras by learning time delayed dependencies between activities cross camera views. Sp...
Chen Change Loy, Tao Xiang and Shaogang Gong