Sciweavers

384 search results - page 25 / 77
» Get another label
Sort
View
PET
2009
Springer
14 years 1 months ago
Privacy-Preserving Policy-Based Information Transfer
As the global society becomes more interconnected and more privacy-conscious, communication protocols must balance access control with protecting participants’ privacy. A common ...
Emiliano De Cristofaro, Stanislaw Jarecki, Jihye K...
FGCN
2007
IEEE
127views Communications» more  FGCN 2007»
14 years 1 months ago
A Survey of Routing Protocols for Energy Constrained Ad Hoc Wireless Networks
In this survey we review energy-aware routing protocols for wireless multihop ad hoc networks and critically discuss the main results in this area. The classification presented is...
Natalia Vassileva, Francisco Barceló-Arroyo
PRDC
2007
IEEE
14 years 1 months ago
Improving Email Reliability by Sender Retransmission
While email is fairly reliable, messages do get lost. This can be due to the store-and-forward nature of email, which passes responsibility for delivering email from one mail serv...
Tim Moors, Patrick Chu
CAISE
2007
Springer
14 years 1 months ago
Achieving trust in IT outsourcing relationships
IT outsourcing is a viable option for organizations to maintain competitiveness and get the ability to focus on core competences. However, there are risks, such as handing over sen...
Eva Söderström, Christian Lennerholt
ECWEB
2004
Springer
126views ECommerce» more  ECWEB 2004»
14 years 23 days ago
A Model for Multi-party Negotiations with Majority Rule
Our model of multi-party negotiations is a many parties, many issues model. The whole multi-party negotiation consists of a set of mutually influencing bilateral negotiations that...
Sheng Zhang, Fillia Makedon, James Ford, Lin Ai