Sciweavers

1147 search results - page 142 / 230
» Transformation of Access Rights
Sort
View
IEEEARES
2007
IEEE
14 years 3 months ago
Using Privacy Process Patterns for Incorporating Privacy Requirements into the System Design Process
In the online world every person has to hold a number of different data sets so as to be able to have access to various e-services and take part in specific economical and social ...
Christos Kalloniatis, Evangelia Kavakli, Stefanos ...
PERSUASIVE
2007
Springer
14 years 3 months ago
Toward a Systematic Understanding of Suggestion Tactics in Persuasive Technologies
The unique capabilities of mobile, context-aware, networked devices make them an interesting platform for applying suggestion in persuasive technologies. Because these devices are ...
Adrienne H. Andrew, Gaetano Borriello, James Fogar...
ACNS
2006
Springer
81views Cryptology» more  ACNS 2006»
14 years 2 months ago
A Handy Multi-coupon System
A coupon is an electronic data that represents the right to access a service provided by a service provider (e.g. gift certificates or movie tickets). Recently, a privacyprotectin...
Sébastien Canard, Aline Gouget, Emeline Huf...
ISMIR
2005
Springer
172views Music» more  ISMIR 2005»
14 years 2 months ago
Preservation Digitization of David Edelberg's Handel LP Collection: A Pilot Project
Although analogue phonograph recordings (LPs) have long shelf lives, there are many reasons for initiating research into proper procedures for their digital preservation. In order...
Catherine Lai, Beinan Li, Ichiro Fujinaga
LCPC
2005
Springer
14 years 2 months ago
Dynamic Compilation for Reducing Energy Consumption of I/O-Intensive Applications
Tera-scale high-performance computing has enabled scientists to tackle very large and computationally challenging scientific problems, making the advancement of scientific discov...
Seung Woo Son, Guangyu Chen, Mahmut T. Kandemir, A...