Sciweavers

8697 search results - page 1589 / 1740
» An Approach to the Enterprise Integration
Sort
View
SACMAT
2009
ACM
14 years 3 months ago
Towards formal security analysis of GTRBAC using timed automata
An access control system is often viewed as a state transition system. Given a set of access control policies, a general safety requirement in such a system is to determine whethe...
Samrat Mondal, Shamik Sural, Vijayalakshmi Atluri
HICSS
2008
IEEE
114views Biometrics» more  HICSS 2008»
14 years 3 months ago
Leveraging the Wisdom of Crowds: Designing an IT-Supported Ideas Competition for an ERP Software Company
“Crowdsourcing” is currently one of the most discussed key words within the open innovation community. The major question for both research and business is how to find and lev...
Winfried Ebner, Jan Marco Leimeister, Ulrich Brets...
ICCD
2008
IEEE
142views Hardware» more  ICCD 2008»
14 years 3 months ago
Gate planning during placement for gated clock network
Abstract— Clock gating is a popular technique for reducing power dissipation in clock network. Although there have been numerous research efforts on clock gating, the previous ap...
Weixiang Shen, Yici Cai, Xianlong Hong, Jiang Hu
RTSS
2008
IEEE
14 years 3 months ago
Merge-by-Wire: Algorithms and System Support
Automakers are trying to make vehicles more intelligent and safe by embedding processors which can be used to implement by-wire applications for taking smart decisions on the road...
Vipul Shingde, Gurulingesh Raravi, Ashish Gudhe, P...
SAINT
2008
IEEE
14 years 3 months ago
inContext: A Pervasive and Collaborative Working Environment for Emerging Team Forms
The way people collaborate has been changed substantially. Team members are now belonging to different organizations, working on multiple objectives at the same time, frequently c...
Hong Linh Truong, Schahram Dustdar, Dino Baggio, S...
« Prev « First page 1589 / 1740 Last » Next »