Sciweavers

102 search results - page 19 / 21
» A study of information systems outsourcing risks
Sort
View
AOSD
2009
ACM
14 years 1 months ago
Enforcing security for desktop clients using authority aspects
Desktop client applications interact with both local and remote resources. This is both a benefit in terms of the rich features desktop clients can provide, but also a security r...
Brett Cannon, Eric Wohlstadter
CSCW
2010
ACM
13 years 11 months ago
Sending mixed signals: multilevel reputation effects in peer-to-peer lending markets
Online peer-to-peer (P2P) lending organizations enable an individual to obtain an unsecured loan from a collection of individuals without the participation of a bank. Previous res...
Benjamin C. Collier, Robert Hampshire
MIE
2008
119views Healthcare» more  MIE 2008»
13 years 8 months ago
Systematizing medical alerts
The current Swedish regulations for medical alerts in health records were designed for paper records. Suggestions for computerized systems are now being investigated. A proposed mo...
Mattias Pettersson, Jenny Wihlborg, Rikard Lö...
ICASSP
2011
IEEE
12 years 10 months ago
A game theoretic approach to eavesdropper cooperation in MISO wireless networks
Information theoretic security, also called secrecy analysis, provides theoretical limit for secret data transmission even in wireless networking environment, and it is more focus...
Joohyun Peter Cho, Yao-Win Peter Hong, C. C. Jay K...
ICPR
2006
IEEE
14 years 7 months ago
Statistical Model for the Classification of the Wavelet Transforms of T-ray Pulses
This study applies Auto Regressive (AR) and Auto Regressive Moving Average (ARMA) modeling to wavelet decomposed terahertz pulsed signals to assist biomedical diagnosis and mail/p...
Bradley Ferguson, Brian Wai-Him Ng, Derek Abbott, ...