Sciweavers

2358 search results - page 389 / 472
» A Secure Pervasive Environment
Sort
View
CORR
2008
Springer
107views Education» more  CORR 2008»
13 years 9 months ago
A Computational Framework for the Near Elimination of Spreadsheet Risk
We present Risk Integrated's Enterprise Spreadsheet Platform (ESP), a technical approach to the near-elimination of spreadsheet risk in the enterprise computing environment, ...
Yusuf Jafry, Fredrika Sidoroff, Roger Chi
CORR
2006
Springer
117views Education» more  CORR 2006»
13 years 9 months ago
The Gaussian Multiple Access Wire-Tap Channel with Collective Secrecy Constraints
We consider the Gaussian Multiple Access Wire-Tap Channel (GMAC-WT). In this scenario, multiple users communicate with an intended receiver in the presence of an intelligent and in...
Ender Tekin, Aylin Yener
CLEIEJ
2007
86views more  CLEIEJ 2007»
13 years 9 months ago
Requirements Game: Teaching Software Project Management
: Several business areas, like Management and Negotiation, have used games like a didactic way to simulate world reality, to introduce students to the day-to-day generated problems...
Carlos Mario Zapata Jaramillo, Gabriel Awad-Aubad
IJNSEC
2006
98views more  IJNSEC 2006»
13 years 9 months ago
Comment on Improvement of the Miyazaki-Takaragi Threshold Digital Signature Scheme
To enhance applications of smart cards, Miyazaki and Takaragi proposed a (t, n) threshold digital signature scheme based on the security of elliptic curve discrete logarithm (ECDL...
Zuhua Shao
JFR
2008
87views more  JFR 2008»
13 years 9 months ago
Hough based terrain classification for realtime detection of drivable ground
The usability of mobile robots for surveillance, search and rescue missions can be significantly improved by intelligent functionalities decreasing the cognitive load on the opera...
Jann Poppinga, Andreas Birk 0002, Kaustubh Pathak