Sciweavers

17789 search results - page 3430 / 3558
» Exceptional Use Cases
Sort
View
133
Voted
FOCS
2002
IEEE
15 years 9 months ago
On the (non)Universality of the One-Time Pad
Randomization is vital in cryptography: secret keys should be randomly generated and most cryptographic primitives (e.g., encryption) must be probabilistic. As a bstraction, it is...
Yevgeniy Dodis, Joel Spencer
HICSS
2002
IEEE
142views Biometrics» more  HICSS 2002»
15 years 9 months ago
Multi-perspective Enterprise Modeling (MEMO) - Conceptual Framework and Modeling Languages
For many companies, the strategic as well as the organizational fit of their information systems is a pivotal factor for staying competitive. At the same time, there is an increas...
Ulrich Frank
HICSS
2002
IEEE
116views Biometrics» more  HICSS 2002»
15 years 9 months ago
E-commerce Security Issues
Without trust, most prudent business operators and clients may decide to forgo use of the Internet and revert back to traditional methods of doing business. To counter this trend,...
Randy C. Marchany, Joseph G. Tront
ICDM
2002
IEEE
138views Data Mining» more  ICDM 2002»
15 years 9 months ago
Extraction Techniques for Mining Services from Web Sources
The Web has established itself as the dominant medium for doing electronic commerce. Consequently the number of service providers, both large and small, advertising their services...
Hasan Davulcu, Saikat Mukherjee, I. V. Ramakrishna...
INFOCOM
2002
IEEE
15 years 8 months ago
Provisioning Content Distribution Networks for Streaming Media
This paper develops simple cost models for provisioning content distribution networks that use the simple and highly scalable bandwidth skimming protocol for streaming. New insight...
Jussara M. Almeida, Derek L. Eager, Michael C. Fer...
« Prev « First page 3430 / 3558 Last » Next »