Sciweavers

176 search results - page 26 / 36
» The Cost of Privatization
Sort
View
ASWEC
2010
IEEE
13 years 7 months ago
On the Use of Properties in Java Applications
—When building software systems, developers have to weigh the benefits of using one specific solution approach against the risks and costs of using another one. This process is...
Markus Lumpe, Samrian Mahmud, Rajesh Vasa
COGSCI
2008
112views more  COGSCI 2008»
13 years 7 months ago
Humor, Abstraction, and Disbelief
bstraction, and Disbelief Elena Hoicka a ; Sarah Jutsum b ; Merideth Gattis b a Department of Psychology, University of California, Santa Cruz b School of Psychology, Cardiff Unive...
Elena Hoicka, Sarah Jutsum, Merideth Gattis
COMCOM
2008
91views more  COMCOM 2008»
13 years 7 months ago
A WEP post-processing algorithm for a Robust 802.11 WLAN implementation
Wired Equivalent Privacy (WEP) protocol used within the IEEE 802.11 standard has "major security flaws" thus wireless local area networks (WLANs) using the protocol are ...
Taskin Koçak, Mohit Jagetia
CERA
2004
89views more  CERA 2004»
13 years 7 months ago
An Electronic Cash Scheme and its Management
: A secure electronic cash scheme and its role-based access control (RBAC) management are proposed in this paper. The scheme uses electronic cash for payment transactions. In this ...
Hua Wang, Yanchun Zhang, Jinli Cao
PVLDB
2010
179views more  PVLDB 2010»
13 years 5 months ago
Nearest Neighbor Search with Strong Location Privacy
The tremendous growth of the Internet has significantly reduced the cost of obtaining and sharing information about individuals, raising many concerns about user privacy. Spatial...
Stavros Papadopoulos, Spiridon Bakiras, Dimitris P...