Sciweavers

3155 search results - page 152 / 631
» How Are You Doing
Sort
View
CAISE
2006
Springer
13 years 11 months ago
Structuring Safety Policy Decomposition
Abstract. Safety policy is a collection of rules that govern the behaviour of entities such that they do not cause accidents. It has been suggested that policies in general can be ...
Martin Hall-May, Tim Kelly
ASIACRYPT
2001
Springer
13 years 11 months ago
Secure Human Identification Protocols
One interesting and important challenge for the cryptologic community is that of providing secure authentication and identification for unassisted humans. There are a range of prot...
Nicholas J. Hopper, Manuel Blum
BNCOD
2008
88views Database» more  BNCOD 2008»
13 years 9 months ago
An Empirical Study of Utility Measures for k-Anonymisation
Abstract. k-Anonymisation is a technique for masking microdata in order to prevent individual identification. Besides preserving privacy, data anonymised by such a method must also...
Grigorios Loukides, Jianhua Shao
DAGSTUHL
2007
13 years 9 months ago
Prioritized Conditional Imperatives: Problems and a New Proposal
Abstract. The sentences of deontic logic may be understood as describing what an agent ought to do when faced with a given set of norms. If these norms come into conflict, the bes...
Jörg Hansen
IMECS
2007
13 years 9 months ago
The Evaluation Study of Customer Satisfaction Based on Gray - AHP Method for B2C Electronic-Commerce Enterprise
—Under electronic commerce, how to raise the consumers’ degree of satisfaction and gain the consumers’ loyalty have become the key factor relating with whether e-commerce ent...
Minghe Wang, Peide Liu, Guoli Ou