Sciweavers

621 search results - page 82 / 125
» Identifying the (Tele)Presence Literature
Sort
View
ASWEC
2008
IEEE
13 years 11 months ago
Towards Formalizing Resource Based Non-conformance in Business
The research presented in the literature thus far on process deviations, inconsistencies and general nonconformance have all been very generic, process wide methodologies. Their a...
Sean Thompson, Torab Torabi
ATAL
2008
Springer
13 years 11 months ago
Searching for approximate equilibria in empirical games
When exploring a game over a large strategy space, it may not be feasible or cost-effective to evaluate the payoff of every relevant strategy profile. For example, determining a p...
Patrick R. Jordan, Yevgeniy Vorobeychik, Michael P...
CCS
2008
ACM
13 years 11 months ago
Secure neighbor discovery in wireless networks: formal investigation of possibility
Wireless communication enables a broad spectrum of applications, ranging from commodity to tactical systems. Neighbor discovery (ND), that is, determining which devices are within...
Marcin Poturalski, Panos Papadimitratos, Jean-Pier...
CCS
2008
ACM
13 years 11 months ago
Security arguments for the UM key agreement protocol in the NIST SP 800-56A standard
The Unified Model (UM) key agreement protocol is an efficient Diffie-Hellman scheme that has been included in many cryptographic standards, most recently in the NIST SP 80056A sta...
Alfred Menezes, Berkant Ustaoglu
CCS
2008
ACM
13 years 11 months ago
Spamalytics: an empirical analysis of spam marketing conversion
The "conversion rate" of spam -- the probability that an unsolicited e-mail will ultimately elicit a "sale" -- underlies the entire spam value proposition. How...
Chris Kanich, Christian Kreibich, Kirill Levchenko...