Sciweavers

3021 search results - page 583 / 605
» Trust in recommender systems
Sort
View
DIGRA
2005
Springer
14 years 2 months ago
Early Games Production in New Zealand
This illustrated paper reports on the early digital games industry in New Zealand, during the late 1970s and 80s. It presents an overview of this largely unknown history, drawing ...
Melanie Swalwell
EUROPKI
2005
Springer
14 years 2 months ago
A Heterogeneous Network Access Service Based on PERMIS and SAML
Abstract The expansion of inter-organizational scenarios based on different authorization schemes involves the development of integration solutions allowing different authorizatio...
Gabriel López Millán, Óscar C...
CIT
2004
Springer
14 years 2 months ago
TCP Based Denial-of-Service Attacks to Edge Network: Analysis and Detection
End-to-end congestion control algorithms in TCP are designed for a highly co-operative environment with the assumption that the end hosts voluntarily participate in it and obey th...
V. Anil Kumar, Dorgham Sisalem
ER
2004
Springer
169views Database» more  ER 2004»
14 years 2 months ago
Intentional Modeling to Support Identity Management
Identity management has arisen as a major and urgent challenge for internet-based communications and information services. Internet services involve complex networks of relationshi...
Lin Liu, Eric S. K. Yu
VMCAI
2004
Springer
14 years 1 months ago
Construction of a Semantic Model for a Typed Assembly Language
Typed Assembly Languages (TALs) can be used to validate the safety of assembly-language programs. However, typing rules are usually trusted as axioms. In this paper, we show how to...
Gang Tan, Andrew W. Appel, Kedar N. Swadi, Dinghao...