Sciweavers

464 search results - page 35 / 93
» Identity Management for Self-Portrayal
Sort
View
CP
2010
Springer
13 years 6 months ago
An Integrated Business Rules and Constraints Approach to Data Centre Capacity Management
A recurring problem in data centres is that the constantly changing workload is not proportionally distributed over the available servers. Some resources may lay idle while others ...
Roman van der Krogt, Jacob Feldman, James Little, ...
CHES
2009
Springer
192views Cryptology» more  CHES 2009»
14 years 8 months ago
CDs Have Fingerprints Too
Abstract. We introduce a new technique for extracting unique fingerprints from identical CDs. The proposed technique takes advantage of manufacturing variability found in the lengt...
Ghaith Hammouri, Aykutlu Dana, Berk Sunar
DIGRA
2005
Springer
14 years 29 days ago
Addressing social dilemmas and fostering cooperation through computer games
The concept of social dilemmas can be used to understand social situations all around us. I am looking at identity formation to help understand why people make the decisions they ...
Mark Chen
ECWEB
2003
Springer
114views ECommerce» more  ECWEB 2003»
14 years 19 days ago
Enhancing E-commerce Security Using GSM Authentication
Abstract. Today, e-commerce transactions are typically protected using SSL/TLS. However, there are risks in such use of SSL/TLS, notably threats arising from the fact that informat...
Vorapranee Khu-smith, Chris J. Mitchell
IDTRUST
2010
ACM
14 years 7 days ago
Federated login to TeraGrid
We present a new federated login capability for the TeraGrid, currently the world’s largest and most comprehensive distributed cyberinfrastructure for open scientific research....
Jim Basney, Terry Fleury, Von Welch