Sciweavers

8697 search results - page 1554 / 1740
» An Approach to the Enterprise Integration
Sort
View
ECIS
2011
12 years 9 months ago
Exploring the contribution of information technology to governance, risk management, and compliance (GRC) initiatives
1 Information technology (IT) has a tremendous impact on the discipline of accounting by introducing new ways of retrieving and processing information about performance deviations ...
Manuel Wiesche, Michael Schermann, Helmut Krcmar
ICDAR
2011
IEEE
12 years 9 months ago
A New Feature Optimization Method Based on Two-Directional 2DLDA for Handwritten Chinese Character Recognition
—LDA transformation is one of the popular feature dimension reduction techniques for the feature extraction in most handwritten Chinese characters recognition systems. The integr...
Xue Gao, Wenhuan Wen, Lianwen Jin
ICDCS
2011
IEEE
12 years 9 months ago
Understanding the Network and User-Targeting Properties of Web Advertising Networks
—Advertising has become an integral and inseparable part of the World Wide Web. However, neither public auditing nor monitoring mechanisms still exist in this emerging area. In t...
Yong Wang, Daniel Burgener, Aleksandar Kuzmanovic,...
INFOCOM
2012
IEEE
12 years 1 days ago
Towards temporal access control in cloud computing
—Access control is one of the most important security mechanisms in cloud computing. Attribute-based access control provides a flexible approach that allows data owners to integ...
Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Dijiang Huang,...
INFOCOM
2012
IEEE
12 years 1 days ago
Submodular game for distributed application allocation in shared sensor networks
Abstract—Wireless sensor networks are evolving from singleapplication platforms towards an integrated infrastructure shared by multiple applications. Given the resource constrain...
Chengjie Wu, You Xu, Yixin Chen, Chenyang Lu
« Prev « First page 1554 / 1740 Last » Next »