Sciweavers

1527 search results - page 221 / 306
» From Requirements to Design: Formalizing the Key Steps
Sort
View
ECIS
2004
13 years 10 months ago
SMEs and internet adoption strategy: who do SMEs listen to?
Governments have developed policies and strategies which are designed to assist SMEs to become eenabled. It is not clear what impact these strategies have on SMEs. There is some e...
Martin Beckinsale, Margi Levy
JSAC
2006
139views more  JSAC 2006»
13 years 9 months ago
ARSA: An Attack-Resilient Security Architecture for Multihop Wireless Mesh Networks
Multihop wireless mesh networks (WMNs) are finding ever-growing acceptance as a viable and effective solution to ubiquitous broadband Internet access. This paper addresses the secu...
Yanchao Zhang, Yuguang Fang
DIM
2006
ACM
14 years 3 months ago
Privacy preserving multi-factor authentication with biometrics
An emerging approach to the problem of reducing the identity theft is represented by the adoption of biometric authentication systems. Such systems however present however several...
Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciari...
ICC
2009
IEEE
134views Communications» more  ICC 2009»
14 years 3 months ago
Short-Length Raptor Codes for Mobile Free-Space Optical Channels
Abstract—Free-space optical (FSO) links are competitive wireless links offering high data rate, security and low system complexity. For mobile applications, e.g., from a ground b...
Wenzhe Zhang, Steve Hranilovic
LREC
2010
193views Education» more  LREC 2010»
13 years 10 months ago
DiSCo - A German Evaluation Corpus for Challenging Problems in the Broadcast Domain
Typical broadcast material contains not only studio-recorded texts read by trained speakers, but also spontaneous and dialect speech, debates with cross-talk, voice-overs, and on-...
Doris Baum, Daniel Schneider, Rolf Bardeli, Jochen...