Sciweavers

496 search results - page 80 / 100
» Where's the (Business) Beef
Sort
View
NSPW
2004
ACM
14 years 3 months ago
Support for multi-level security policies in DRM architectures
Digital rights management systems allow copyrighted content to be commercialized in digital format without the risk of revenue loss due to piracy. Making such systems secure is no...
Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenba...
QOFIS
2004
Springer
14 years 3 months ago
Provider-Level Service Agreements for Inter-domain QoS Delivery
In the current Internet, business relationships and agreements between peered ISPs do not usually make specific guarantees on reachability, availability or network performance. How...
Panos Georgatsos, Jason Spencer, David Griffin, Ta...
COMPSAC
2003
IEEE
14 years 3 months ago
Just What Could Possibly Go Wrong In B2B Integration?
One important trend in enterprise-scale IT has been the increasing use of business-to-business integration (B2Bi) technologies to automate business processes that cross organisati...
Dean Kuo, Alan Fekete, Paul Greenfield, Julian Jan...
ATAL
2003
Springer
14 years 3 months ago
Coalition formation with uncertain heterogeneous information
Coalition formation methods allow agents to join together and are thus necessary in cases where tasks can only be performed cooperatively by groups. This is the case in the Reques...
Sarit Kraus, Onn Shehory, Gilad Taase
DRM
2003
Springer
14 years 3 months ago
The IP war: apocalypse or revolution?
In the Foundation series, Asimov predicted a 1,000 years of darkness following the fall of the galactic empire. In the book Noir, K.W Jeter describes a world where IP is the ultim...
Tsvi Gal, Howard M. Singer, Laird Popkin