نتایج جستجو برای: third party
تعداد نتایج: 267981 فیلتر نتایج به سال:
In this paper, a method is described for user self-profiling when engaged in e-commerce over the Internet, by which customers can have greater control over profiles relating to their behaviour or preferences and can exploit this information without revealing their identity. This is achieved using trusted agents that exploit Trusted Computing Platform technology (cf. www.trustedpc.org).
A mathematical formula for estimating spatial release from masking (SRM) in a cocktail party environment would be useful as a simpler alternative to computationally intensive algorithms and may enhance understanding of underlying mechanisms. The experiment presented herein was designed to provide a strong test of a model that divides SRM into contributions of asymmetry and angular separation [B...
A novel social network based group decision making (SN-GDM) model with experts’ weights not provided beforehand and with the following four tuple information: trust; distrust; hesitancy; and inconsistency, is introduced. The concepts of trust score (TS) and knowledge degree (KD) are defined and combined into a trust order space. Then, a strict trust ranking order relation of trust function valu...
Most of the research work for enforcing security policies on smartphones considered coarse-grained policies, e.g. either to allow an application to run or not. In this paper we present CRePE, the first system that is able to enforce fine-grained policies, e.g. that vary while an application is running, that also depend on the context of the smartphone. A context can be defined by the status of ...
This paper presents applications for the weak protection of secrets in which weakness is not just acceptable but desirable. For one application, two versions of a lottery scheme are presented in which the result of the lottery is determined by the ticket numbers purchased, but no one can control the outcome or determine what it is until after the lottery closes. This is because the outcome is k...
BACKGROUND Ageing of Mexican population implies greater demand of hospital services. Nevertheless, the available resources are used inadequately. In this study, the direct medical costs associated with the appropriateness of elderly populations hospital stay are estimated. METHODS Appropriateness of hospital stay was evaluated with the Appropriateness Evaluation Protocol (AEP). Direct medical...
To increase the lifespan of wireless sensor networks (WSN) and preserve the energy of sensors, data aggregation techniques are usually used. Aggregation can be seen as the process by which data sent from sensors to the BS are little-by-little processed by some nodes called aggregator nodes. Aggregators collect data from surrounding nodes and produce a small sized output, thus preventing that al...
In this paper, we propose a new electronic voting scheme which guarantees receipt-freeness as well as privacy, universal veriiability and robustness. The result of Cramer, Gennaro, and SchoenmarkerssCGS97] proposed at Eurocrypt'97 seems to be promising because it provides optimal performance , privacy, robustness, and universal veriiability. But in their scheme, receipt-freeness was left as an ...
We present a protocol developed by the ASPeCT project for secure billing that provides the incontestable charging that is required for UMTS. This protocol realises a payment system for value added services. We describe the protocol and in particular the design features that are of particular relevance to the UMTS environment. We also describe the configuration of a field trial of this protocol ...
Adopting concepts from statistical language modeling and rulebased transformations can lead to effective and efficient text-tophone (TTP) functions. We present here the methods and results of one such effort, resulting in a relatively compact and fast set of TTP rules that achieves 94.5% segmental phonemic accuracy.
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید