Sciweavers

8243 search results - page 62 / 1649
» Can We Manage Trust
Sort
View
EDM
2010
163views Data Mining» more  EDM 2010»
13 years 9 months ago
Can Order of Access to Learning Resources Predict Success?
Learning management systems capture student's interactions with the course contents in the form of event logs, including the order in which resources are accessed. We build on...
Hema Soundranayagam, Kalina Yacef
ACSAC
2003
IEEE
14 years 29 days ago
An Editor for Adaptive XML-Based Policy Management of IPsec
The IPsec protocol provides a mechanism to enforce a range of security services for both confidentiality and integrity, enabling secure transmission of information across networks...
Raj Mohan, Timothy E. Levin, Cynthia E. Irvine
ACMICEC
2007
ACM
163views ECommerce» more  ACMICEC 2007»
13 years 11 months ago
Digital rights management using a mobile phone
This paper focuses on the problem of preventing illegal copying of digital assets without jeopardising the right of legitimate licence holders to transfer content between their ow...
Imad M. Abbadi, Chris J. Mitchell
WDAG
2005
Springer
80views Algorithms» more  WDAG 2005»
14 years 1 months ago
Obstruction-Free Algorithms Can Be Practically Wait-Free
Abstract. The obstruction-free progress condition is weaker than previous nonblocking progress conditions such as lock-freedom and waitfreedom, and admits simpler implementations t...
Faith Ellen Fich, Victor Luchangco, Mark Moir, Nir...
SAC
2004
ACM
14 years 1 months ago
Trust enhanced ubiquitous payment without too much privacy loss
Computational models of trust have been proposed for use in ubicomp environments for deciding whether to allow customers to pay with an e-purse or not. In order to build trust in ...
Jean-Marc Seigneur, Christian Damsgaard Jensen