نتایج جستجو برای: third party

تعداد نتایج: 267981  

2002
Siani Pearson

In this paper, a method is described for user self-profiling when engaged in e-commerce over the Internet, by which customers can have greater control over profiles relating to their behaviour or preferences and can exploit this information without revealing their identity. This is achieved using trusted agents that exploit Trusted Computing Platform technology (cf. www.trustedpc.org).

Journal: :The Journal of the Acoustical Society of America 2011
Gary L Jones Ruth Y Litovsky

A mathematical formula for estimating spatial release from masking (SRM) in a cocktail party environment would be useful as a simpler alternative to computationally intensive algorithms and may enhance understanding of underlying mechanisms. The experiment presented herein was designed to provide a strong test of a model that divides SRM into contributions of asymmetry and angular separation [B...

Journal: :Knowl.-Based Syst. 2016
Jian Wu Ruoyun Xiong Francisco Chiclana

A novel social network based group decision making (SN-GDM) model with experts’ weights not provided beforehand and with the following four tuple information: trust; distrust; hesitancy; and inconsistency, is introduced. The concepts of trust score (TS) and knowledge degree (KD) are defined and combined into a trust order space. Then, a strict trust ranking order relation of trust function valu...

2010
Mauro Conti Vu Thien Nga Nguyen Bruno Crispo

Most of the research work for enforcing security policies on smartphones considered coarse-grained policies, e.g. either to allow an application to run or not. In this paper we present CRePE, the first system that is able to enforce fine-grained policies, e.g. that vary while an application is running, that also depend on the context of the smartphone. A context can be defined by the status of ...

1998
Paul F. Syverson

This paper presents applications for the weak protection of secrets in which weakness is not just acceptable but desirable. For one application, two versions of a lottery scheme are presented in which the result of the lottery is determined by the ticket numbers purchased, but no one can control the outcome or determine what it is until after the lottery closes. This is because the outcome is k...

Journal: :BMC Health Services Research 2009
Joaquín F Mould-Quevedo Carmen García-Peña Iris Contreras-Hernández Teresa Juárez-Cedillo Claudia Espinel-Bermúdez Gabriela Morales-Cisneros Sergio Sánchez-García

BACKGROUND Ageing of Mexican population implies greater demand of hospital services. Nevertheless, the available resources are used inadequately. In this study, the direct medical costs associated with the appropriateness of elderly populations hospital stay are estimated. METHODS Appropriateness of hospital stay was evaluated with the Appropriateness Evaluation Protocol (AEP). Direct medical...

2007
Chakib Bekara Maryline Laurent-Maknavicius Kheira Dari Bekara

To increase the lifespan of wireless sensor networks (WSN) and preserve the energy of sensors, data aggregation techniques are usually used. Aggregation can be seen as the process by which data sent from sensors to the BS are little-by-little processed by some nodes called aggregator nodes. Aggregators collect data from surrounding nodes and produce a small sized output, thus preventing that al...

2000
Byoungcheon Lee Kwangjo Kim

In this paper, we propose a new electronic voting scheme which guarantees receipt-freeness as well as privacy, universal veriiability and robustness. The result of Cramer, Gennaro, and SchoenmarkerssCGS97] proposed at Eurocrypt'97 seems to be promising because it provides optimal performance , privacy, robustness, and universal veriiability. But in their scheme, receipt-freeness was left as an ...

1998
G. Horn P. Howard K. M. Martin C. J. Mitchell B. Preneel K. Rantos

We present a protocol developed by the ASPeCT project for secure billing that provides the incontestable charging that is required for UMTS. This protocol realises a payment system for value added services. We describe the protocol and in particular the design features that are of particular relevance to the UMTS environment. We also describe the configuration of a field trial of this protocol ...

1999
William M. Fisher

Adopting concepts from statistical language modeling and rulebased transformations can lead to effective and efficient text-tophone (TTP) functions. We present here the methods and results of one such effort, resulting in a relatively compact and fast set of TTP rules that achieves 94.5% segmental phonemic accuracy.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید