Sciweavers

493 search results - page 32 / 99
» Service Systems as Customer-Intensive Systems and Its Implic...
Sort
View
ATAL
2007
Springer
13 years 9 months ago
InterPol: a policy framework for managing trust and privacy in referral networks
Referral networks are a kind of P2P system consisting of autonomous agents who seek, provide services, or refer other service providers. Key applications include service discovery...
Yathiraj B. Udupi, Munindar P. Singh
ECIS
2003
13 years 9 months ago
E-negotiations: towards engineering of technology-based social processes
Traditionally, negotiation support was based on normative and prescriptive research; its users were analysts and experts. The purpose of the recently developed e-negotiation syste...
Gregory E. Kersten
EUROMICRO
1998
IEEE
13 years 12 months ago
Two-Level Communication Protocol for a Web Operating System (WOS?)
The World-Wide Web consists not only of informational, but also computational resources. However, these resources, especially computational ones are underutilized. One characteris...
Gilbert Babin, Peter G. Kropf, Herwig Unger
IH
2001
Springer
14 years 4 days ago
Real World Patterns of Failure in Anonymity Systems
Abstract. We present attacks on the anonymity and pseudonymity provided by a “lonely hearts” dating service and by the HushMail encrypted email system. We move on to discuss so...
Richard Clayton, George Danezis, Markus G. Kuhn
EUROSYS
2007
ACM
14 years 4 months ago
Concierge: a service platform for resource-constrained devices
As mobile and embedded devices become widespread, the management and configuration of the software in the devices is increasingly turning into a critical issue. OSGi is a busines...
Jan S. Rellermeyer, Gustavo Alonso