Sciweavers

237 search results - page 19 / 48
» Economics of Personal Information Exchange
Sort
View
CSREASAM
2006
13 years 9 months ago
A Proposal of One-Time Biometric Authentication
- In biometric authentication, feature information of each enrolled person's biometric information is enrolled as templates. Secure databases or anti-tampered devices store th...
Yoshifumi Ueshige, Kouichi Sakurai
CIKM
2008
Springer
13 years 9 months ago
Conflict ontology enrichment based on triggers
In this paper, we propose an ontology-based approach that enables to detect the emergence of relational conflicts between persons that cooperate on computer supported projects. In...
Chahnez Zakaria, Olivier Curé, Kamel Sma&iu...
JUCS
2006
225views more  JUCS 2006»
13 years 7 months ago
Restricting the View and Connecting the Dots - Dangers of a Web Search Engine Monopoly
: Everyone realizes how powerful the few big Web search engine companies have become, both in terms of financial resources due to soaring stock quotes and in terms of the still hid...
Narayanan Kulathuramaiyer, Wolf-Tilo Balke
CORR
2011
Springer
196views Education» more  CORR 2011»
12 years 11 months ago
Privacy-Enhanced Reputation-Feedback Methods to Reduce Feedback Extortion in Online Auctions
In this paper, we study methods for improving the utility and privacy of reputation scores for online auctions, such as used in eBay, so as to reduce the effectiveness of feedbac...
Michael T. Goodrich, Florian Kerschbaum
INFOCOM
2006
IEEE
14 years 1 months ago
Using Repeated Games to Design Incentive-Based Routing Systems
Abstract— Incorporating pricing information in routing systems has been explored in various contexts and fashions. In this paper we examine certain fundamental properties importa...
Michael Afergan