Sciweavers

53302 search results - page 10401 / 10661
» Meta-Design: Design for Designers
Sort
View
IFIP11
2004
122views Business» more  IFIP11 2004»
15 years 6 months ago
Infusing Privacy Norms in DRM - Incentives and Perspectives from Law
: This paper outlines some basic characteristics of digital rights management (DRM) systems, as well as the ways that DRM systems can threaten user privacy. The author asserts that...
Alex Cameron
CMG
2003
15 years 6 months ago
Men are From Mars, Women Are From Venus, Web Services are From Betelgeuse
Having trouble making robust legacy applications talk to hot new Web applications? Trying to manage business transactions with your partners when everyone is running their proprie...
Denise P. Kalm, Annie W. Shum
EUNIS
2001
15 years 6 months ago
The influence of the Information System on administrative processes at the University of Latvia
: The goal of this paper is to describe how the development, implementation, and deployment of Information System of University of Latvia changed the life of the University and fac...
Janis Stonis, Laila Niedrite, Aivars Niedritis
CMS
2003
171views Communications» more  CMS 2003»
15 years 6 months ago
Securing the Border Gateway Protocol: A Status Update
The Border Gateway Protocol (BGP) is a critical component of the Internet routing infrastructure, used to distribute routing information between autonomous systems (ASes). It is hi...
Stephen T. Kent
CSREASAM
2003
15 years 6 months ago
Randomized Traitor Tracing Algorithms for Broadcast Security
We introduce and analyze a randomized traitor tracing algorithm for broadcast security. This algorithm is very efficient compared to brute force methods (the mean time it takes is...
Simon McNicol, Serdar Boztas
« Prev « First page 10401 / 10661 Last » Next »