Sciweavers

410 search results - page 73 / 82
» Making norms concrete
Sort
View
WPES
2005
ACM
14 years 1 months ago
Maintaining privacy on derived objects
Protecting privacy means to ensure users that access to their personal data complies with their preferences. However, information can be manipulated in order to derive new objects...
Nicola Zannone, Sushil Jajodia, Fabio Massacci, Du...
STACS
2005
Springer
14 years 29 days ago
Algorithmics in Exponential Time
Exponential algorithms, i.e. algorithms of complexity O(cn ) for some c > 1, seem to be unavoidable in the case of NP-complete problems (unless P=NP), especially if the problem ...
Uwe Schöning
MIDDLEWARE
2004
Springer
14 years 26 days ago
Adapting asynchronous messaging middleware to ad hoc networking
The characteristics of mobile environments, with the possibility of frequent disconnections and fluctuating bandwidth, have forced a rethink of traditional middleware. In particu...
Mirco Musolesi, Cecilia Mascolo, Stephen Hailes
QOFIS
2004
Springer
14 years 25 days ago
Provider-Level Service Agreements for Inter-domain QoS Delivery
In the current Internet, business relationships and agreements between peered ISPs do not usually make specific guarantees on reachability, availability or network performance. How...
Panos Georgatsos, Jason Spencer, David Griffin, Ta...
HICSS
2003
IEEE
126views Biometrics» more  HICSS 2003»
14 years 24 days ago
A Watermarking Infrastructure for Enterprise Document Management
Digital watermarking is a promising technology to embed copyright information as unperceivable signals in digital contents. Although various watermarking techniques have been empl...
Shing-Chi Cheung, Dickson K. W. Chiu