Sciweavers

26354 search results - page 113 / 5271
» How we refactor, and how we know it
Sort
View
SAC
2009
ACM
14 years 5 months ago
Cross-organizational ERP management: how to create a successful business case?
This paper deals with the development and use of business cases in support of cross-organizational enterprise resource planning (ERP)-enabled e-business integration initiatives. I...
Silja Eckartz, Maya Daneva, Roel Wieringa, Jos van...
GLOBECOM
2009
IEEE
14 years 5 months ago
How Bad is Single-Path Routing
—This paper investigates the network performance loss of using only single-path routing when multiple paths are available. The performance metric is the aggregate utility achieve...
Meng Wang, Chee Wei Tan, Ao Tang, Steven H. Low
PET
2009
Springer
14 years 4 months ago
Vida: How to Use Bayesian Inference to De-anonymize Persistent Communications
We present the Vida family of abstractions of anonymous communication systems, model them probabilistically and apply Bayesian inference to extract patterns of communications and u...
George Danezis, Carmela Troncoso
FSE
2007
Springer
104views Cryptology» more  FSE 2007»
14 years 4 months ago
How to Enrich the Message Space of a Cipher
Abstract. Given (deterministic) ciphers E and E that can encipher messages of l and n bits, respectively, we construct a cipher E∗ = XLS[E, E] that can encipher messages of l + s...
Thomas Ristenpart, Phillip Rogaway
ACCV
2006
Springer
14 years 4 months ago
How to Compute the Pose of an Object Without a Direct View?
We consider the task of computing the pose of an object relative to a camera, for the case where the camera has no direct view of the object. This problem was encountered in work o...
Peter F. Sturm, Thomas Bonfort