Showing 1 - 10 of 614
in the automated negotiation of service contracts based on exogenously stated requirements / capabilities. In doing so it …
Persistent link: https://www.econbiz.de/10009461329
Persistent link: https://www.econbiz.de/10012007294
The use of electronic spreadsheets as the primary software tool for teaching management science modeling techniques and quantitative methods in economics and finance undoubtedly played a key role in the increasing impact of quantitative lectures given in graduate programs. Researchers suggest...
Persistent link: https://www.econbiz.de/10010296462
An enormous growth in internet usage has resulted into great amounts of digital data to handle. Data sharing has become significant and unavoidable. Data owners want the data to be secured and perennially available. Data protection and any violations thereby become crucial. This work proposes a...
Persistent link: https://www.econbiz.de/10012042644
privacy and security, suffer from one or more anomalies, and hence the problem of securing LBS data is far from being resolved …
Persistent link: https://www.econbiz.de/10012042666
This paper presents a robust and imperceptible methodology of watermark embedding. It uses two vital techniques, firstly the Multi-Resolution Singular Value Decomposition (MR-SVD) and an image adaptive algorithm on the lines of the human visual system (HVS), called Noise Visibility Function...
Persistent link: https://www.econbiz.de/10012042710
aspects. Non-availability of a standard functional SDI model based on SOA, Lack of technical interoperability and security … models, which links the metadata server to database server, 3-tier interoperability and security framework with the help of …
Persistent link: https://www.econbiz.de/10012042844
end-to-end data, voice and video. Data transmission through WMN has the security and reliability, same as the conventional …
Persistent link: https://www.econbiz.de/10012043257
, these Single Factor Authentication mechanisms are proved to be defective. In virtue of enhancing security, recent researches … the research not just reduces the expense of proposed authentication schemes, yet gives security similarly as smart card …
Persistent link: https://www.econbiz.de/10012043265
, scalability, and security. This research proposes a secure session initiation protocol model. It called the redundant session … registration mechanism that can be deployed in service provider data centers to maintain the service availability, security and …
Persistent link: https://www.econbiz.de/10012043352