Sciweavers

2217 search results - page 360 / 444
» An economic view of information systems
Sort
View
ACNS
2006
Springer
167views Cryptology» more  ACNS 2006»
14 years 19 days ago
Public Key Cryptography Sans Certificates in Ad Hoc Networks
Abstract. Several researchers have proposed the use of threshold cryptographic model to enable secure communication in ad hoc networks without the need of a trusted center. In this...
Nitesh Saxena
MSV
2004
13 years 10 months ago
Correctness Criteria for Models' Validation- A Philosophical Perspective
Valid models are central to the existence of Computer science as in most other disciplines, but at what point can one say that a model is valid and hence correct? is often taken t...
Ijeoma Sandra Irobi, Johan Andersson, Anders Wall
ICIS
2000
13 years 10 months ago
The politics of IS evaluation: a social shaping perspective
A considerable amount of research has already been conducted in the IT/IS evaluation arena, yet rewards remain elusive. This has been variously explained and in this paper we aim ...
Melanie Wilson, Debra Howcroft
CN
1999
115views more  CN 1999»
13 years 8 months ago
A large scale distributed intrusion detection framework based on attack strategy analysis
To appropriately address the problem of large-scale distributed intrusion assessment/detection, issues such as information exchange, work division and coordination amongst various...
Ming-Yuh Huang, Robert J. Jasper, Thomas M. Wicks
ACMIDC
2009
13 years 6 months ago
Developing a media space for remote synchronous parent-child interaction
While supporting family communication has traditionally been a domain of interest for interaction designers, few research initiatives have explicitly investigated remote synchrono...
Svetlana Yarosh, Stephen Cuzzort, Hendrik Mül...