Sciweavers

329 search results - page 51 / 66
» A Survey of Lightweight-Cryptography Implementations
Sort
View
SDM
2008
SIAM
118views Data Mining» more  SDM 2008»
13 years 9 months ago
Massive-Scale Kernel Discriminant Analysis: Mining for Quasars
We describe a fast algorithm for kernel discriminant analysis, empirically demonstrating asymptotic speed-up over the previous best approach. We achieve this with a new pattern of...
Ryan Riegel, Alexander Gray, Gordon Richards
AISM
2004
13 years 9 months ago
Understanding Challenges of Information Security Culture: A Methodological Issue
Although, many organisations have implemented technical solutions to protect information resources from adverse events, internal security breaches continue to occur. Therefore an ...
Omar Zakaria
ECIS
2003
13 years 9 months ago
The value of cooperative planning in supply chains. A simulative approach
In this paper we examine, how the benefits of Supply Chain Management, as announced by the literature and widely accepted, can simulatively be proven. We first present selected re...
Luis Martín Díaz, Peter Buxmann
ICWS
2003
IEEE
13 years 9 months ago
Semantic Web Enabled Web Services: State-of-Art and Industrial Challenges
Semantic Web technology has a vision to define and link Web data in a way that it can be understood and used by machines for automation, integration and reuse of data across variou...
Vagan Y. Terziyan, Oleksandr Kononenko
WORM
2003
13 years 9 months ago
Worm anatomy and model
We present a general framework for reasoning about network worms and analyzing the potency of worms within a specific network. First, we present a discussion of the life cycle of ...
Dan Ellis