Sciweavers

8243 search results - page 1606 / 1649
» Can We Manage Trust
Sort
View
AINA
2004
IEEE
14 years 14 days ago
An Efficient Clustered Architecture for P2P Networks
Peer-to-peer (P2P) computing offers many attractive features, such as self-organization, load-balancing, availability, fault tolerance, and anonymity. However, it also faces some ...
Juan Li, Son T. Vuong
CSFW
2004
IEEE
14 years 14 days ago
The Consistency of Task-Based Authorization Constraints in Workflow Systems
Workflow management systems (WFMSs) have attracted a lot of interest both in academia and the business community. A workflow consists of a collection of tasks that are organized t...
Kaijun Tan, Jason Crampton, Carl A. Gunter
DRM
2006
Springer
14 years 12 days ago
Vicarious infringement creates a privacy ceiling
In high-tech businesses ranging from Internet service providers to e-commerce websites and music stores like Apple iTunes, there is considerable potential for collecting personal ...
Janice Y. Tsai, Lorrie Faith Cranor, Scott Craver
FSKD
2006
Springer
298views Fuzzy Logic» more  FSKD 2006»
14 years 11 days ago
Risk Assessment of E-Commerce Projects Using Evidential Reasoning
The purpose of this study is to develop a decision making system to evaluate the risks in E-Commerce (EC) projects. Competitive software businesses have the critical task of assess...
Rashid Hafeez Khokhar, David A. Bell, Jiwen Guan, ...
JELIA
2000
Springer
14 years 9 days ago
An Algorithmic Approach to Recover Inconsistent Knowledge-Bases
Abstract. We consider an algorithmic approach for revising inconsistent data and restoring its consistency. This approach detects the\spoiled" part of the data (i.e., the set ...
Ofer Arieli
« Prev « First page 1606 / 1649 Last » Next »