Sciweavers

329 search results - page 27 / 66
» A Survey of Lightweight-Cryptography Implementations
Sort
View
HICSS
2008
IEEE
153views Biometrics» more  HICSS 2008»
14 years 2 months ago
Prioritizing Clinical Information System Project Risk Factors: A Delphi Study
Identifying the risks associated with the implementation of clinical information systems (CIS) in health care organizations can be a major challenge for managers, clinicians, and ...
Guy Paré, Claude Sicotte, Mirou Jaana, Davi...
USS
2008
13 years 10 months ago
Towards Systematic Evaluation of the Evadability of Bot/Botnet Detection Methods
Automated bot/botnet detection is a difficult problem given the high level of attacker power. We propose a systematic approach for evaluating the evadability of detection methods....
Elizabeth Stinson, John C. Mitchell
FPGA
2008
ACM
174views FPGA» more  FPGA 2008»
13 years 9 months ago
When FPGAs are better at floating-point than microprocessors
It has been shown that FPGAs could outperform high-end microprocessors on floating-point computations thanks to massive parallelism. However, most previous studies re-implement in...
Florent de Dinechin, Jérémie Detrey,...
AIPRF
2007
13 years 9 months ago
Adaptive Novice Supporter
In this paper, we implemented very simple plan generator which can help the novice researchers do their research efficiently. We have assumed that we should not make domain expert...
Sung-Pil Choi, Ho-Jin Choi, Sung-Hyon Myaeng
IJNVO
2007
90views more  IJNVO 2007»
13 years 7 months ago
Exploring the transaction dimensions of supply chain management
It is argued that firm cooperation in supply chain management can be classified as a hybrid governance structure in a new institutional sense. Using a key informant survey, explora...
Britta Lietke, Madlen Boslau