Sciweavers

6616 search results - page 1297 / 1324
» Can markets help
Sort
View
TPDS
2008
116views more  TPDS 2008»
13 years 7 months ago
Pseudo Trust: Zero-Knowledge Authentication in Anonymous P2Ps
Most trust models in Peer-to-Peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer's identity. Hence,...
Li Lu, Jinsong Han, Yunhao Liu, Lei Hu, Jinpeng Hu...
JKM
2007
213views more  JKM 2007»
13 years 7 months ago
A systems-based dynamic knowledge transfer capacity model
Purpose – The purpose of this paper is twofold: to understand how recent developments in systems thinking and social construction can influence understanding of knowledge trans...
Robert Parent, Mario Roy, Denis St-Jacques
VLC
2008
191views more  VLC 2008»
13 years 7 months ago
Visual specification of measurements and redesigns for domain specific visual languages
Ensuring model quality is a key success factor in many computer science areas, and becomes crucial in recent software engineering paradigms like the one proposed by model-driven s...
Esther Guerra, Juan de Lara, Paloma Díaz
KBS
2007
74views more  KBS 2007»
13 years 7 months ago
Representation and processing of information related to real world events
Event based analysis plays an important role in reducing the latency of information delivery in an event driven world. Also, the perception of an ‘event’ by a user is at a hig...
Aparna Nagargadde, V. Sridhar, Krithi Ramamritham
AIM
2002
13 years 7 months ago
Computational Vulnerability Analysis for Information Survivability
The Infrastructure of modern society is controlled by software systems. These systems are vulnerable to attacks; several such attacks, launched by "recreation hackers" h...
Howard E. Shrobe
« Prev « First page 1297 / 1324 Last » Next »