Sciweavers

3155 search results - page 152 / 631
» How Are You Doing
Sort
View
CAISE
2006
Springer
15 years 6 months ago
Structuring Safety Policy Decomposition
Abstract. Safety policy is a collection of rules that govern the behaviour of entities such that they do not cause accidents. It has been suggested that policies in general can be ...
Martin Hall-May, Tim Kelly
ASIACRYPT
2001
Springer
15 years 6 months ago
Secure Human Identification Protocols
One interesting and important challenge for the cryptologic community is that of providing secure authentication and identification for unassisted humans. There are a range of prot...
Nicholas J. Hopper, Manuel Blum
BNCOD
2008
88views Database» more  BNCOD 2008»
15 years 4 months ago
An Empirical Study of Utility Measures for k-Anonymisation
Abstract. k-Anonymisation is a technique for masking microdata in order to prevent individual identification. Besides preserving privacy, data anonymised by such a method must also...
Grigorios Loukides, Jianhua Shao
DAGSTUHL
2007
15 years 4 months ago
Prioritized Conditional Imperatives: Problems and a New Proposal
Abstract. The sentences of deontic logic may be understood as describing what an agent ought to do when faced with a given set of norms. If these norms come into conflict, the bes...
Jörg Hansen
IMECS
2007
15 years 4 months ago
The Evaluation Study of Customer Satisfaction Based on Gray - AHP Method for B2C Electronic-Commerce Enterprise
—Under electronic commerce, how to raise the consumers’ degree of satisfaction and gain the consumers’ loyalty have become the key factor relating with whether e-commerce ent...
Minghe Wang, Peide Liu, Guoli Ou