Sciweavers

739 search results - page 80 / 148
» Information Flow in Credential Systems
Sort
View
UIST
2006
ACM
14 years 1 months ago
Huddle: automatically generating interfaces for systems of multiple connected appliances
Systems of connected appliances, such as home theaters and presentation rooms, are becoming commonplace in our homes and workplaces. These systems are often difficult to use, in p...
Jeffrey Nichols, Brandon Rothrock, Duen Horng Chau...
ISJ
2002
212views more  ISJ 2002»
13 years 7 months ago
Assessing and managing the benefits of enterprise systems: the business manager's perspective
This paper focuses on the benefits that organizations may achieve from their investment in enterprise systems (ES). It proposes an ES benefit framework for summarizing benefits in ...
Shari Shang, Peter B. Seddon
DBSEC
2009
124views Database» more  DBSEC 2009»
13 years 8 months ago
Towards System Integrity Protection with Graph-Based Policy Analysis
Abstract. Identifying and protecting the trusted computing base (TCB) of a system is an important task, which is typically performed by designing and enforcing a system security po...
Wenjuan Xu, Xinwen Zhang, Gail-Joon Ahn
CIMCA
2008
IEEE
14 years 2 months ago
The Inner Structure of Database for the CBIR System
In this article we focus on the presentation of the inner structure of the database for the Content-Based Image Retrieval (CBIR) system containing house images. The part devoted t...
Tatiana Jaworska
ITNG
2006
IEEE
14 years 1 months ago
Contextual Events Framework in RFID System
Radio Frequency Identification (RFID) technology is considered to be the next step in the revolution of supplychain management, retail, and beyond. To derive real benefit from RFI...
Mikyeong Moon, Youngbong Kim, Keunhyuk Yeom