In visual cryptography, the secret can be any written text, graphical representation, or picture. This technique, some time called visual secret sharing (VSS), allows visual infor...
The rising cost of healthcare is one of the major concerns faced by the nation. One way to lower healthcare costs and provide better quality care to patients is through the effect...
Praveen R. Rao, Stanley A. Edlavitch, Jeffrey L. H...
We have designed, implemented and evaluated a resource adaptive distributed information sharing system where automatic adjustments are made internally in our information sharing sy...
Hans Vatne Hansen, Vera Goebel, Thomas Plagemann, ...
As supply chains evolve beyond the confines of individual organizations, information sharing has become the holy grail in supply chain technology. Although the value of information...
- The eras in which learning was limited to a special class of people has far reached its end. Rapid changes of information technologies, which affect all aspects of today's l...
A growing empirical literature examines the relationship between music file sharing and legal purchases of music, but existing studies examine the period before consumers had attr...
In recent years, we have witnessed a significant growth of "social computing" services, or online communities where users contribute content in various forms, including ...
Abstract. We study the interaction between network effects and external incentives on file sharing behavior in Peerto-Peer (P2P) networks. Many current or envisioned P2P networks r...
Car sharing and car pooling have proven to be an effective solution to reduce the amount of running vehicles by increasing the number of passengers per car amongst medium/big commu...
Vincenzo Dezani-Ciancaglini, Luigi Liquori, Lauren...
Sharing life-log information in a social community has many advantages, both for the user and society. But sharing any type of personal information is a threat to privacy. In parti...