Sciweavers

1663 search results - page 256 / 333
» Privacy and Identity Management
Sort
View
OOPSLA
2005
Springer
15 years 9 months ago
Estimating software based on use case points
It is well documented that software product cost estimates are notoriously inaccurate across the software industry. Creating accurate cost estimates for software product developme...
Edward R. Carroll
WWW
2007
ACM
16 years 4 months ago
Organizing Publications and Bookmarks in BibSonomy
BibSonomy is a web-based social resource sharing system which allows users to organise and share bookmarks and publications in a collaborative manner. Apart from standard folksono...
Andreas Hotho, Beate Krause, Christoph Schmitz, Ge...
EDBT
2008
ACM
131views Database» more  EDBT 2008»
16 years 4 months ago
A Bayesian approach for on-line max and min auditing
In this paper we consider the on-line max and min query auditing problem: given a private association between fields in a data set, a sequence of max and min queries that have alr...
Gerardo Canfora, Bice Cavallo
PERCOM
2007
ACM
16 years 3 months ago
Challenges for Pervasive RFID-Based Infrastructures
The success of RFID in supply chain management is leading many to consider more personal and pervasive deployments of this technology. Unlike industrial settings, however, deploym...
Evan Welbourne, Magdalena Balazinska, Gaetano Borr...
PERCOM
2004
ACM
16 years 3 months ago
On Negotiating Automatic Device Configuration in Smart Environments
As the number of mobile devices we carry grows, the job of managing those devices throughout the day becomes cumbersome. In addition, the ability to use mobile devices in unethica...
Kay Connelly, Ashraf Khalil