Sciweavers

9640 search results - page 1819 / 1928
» Information Systems Development as an Activity
Sort
View
IJNSEC
2007
164views more  IJNSEC 2007»
13 years 8 months ago
A Biometric Identity Based Signature Scheme
We describe an identity based signature scheme that uses biometric information to construct the public key. Such a scheme would be beneficial in many repudiation situations for e...
Andrew Burnett, Fergus Byrne, Tom Dowling, Adam Du...
IJSWIS
2007
113views more  IJSWIS 2007»
13 years 8 months ago
A Formal Foundation for Ontology-Alignment Interaction Models
Ontology alignment foundations are hard to find in the literature. The abstract nature of the topic and the diverse means of practice make it difficult to capture it in a universal...
W. Marco Schorlemmer, Yannis Kalfoglou, Manuel Ate...
TCSV
2008
124views more  TCSV 2008»
13 years 8 months ago
A Novel Look-Up Table Design Method for Data Hiding With Reduced Distortion
Look-up table (LUT)-based data hiding is a simple and efficient technique to hide secondary information (watermark) into multimedia work for various applications such as copyright ...
Xiao-Ping Zhang, Kan Li, Xiaofeng Wang
TDP
2008
111views more  TDP 2008»
13 years 8 months ago
Statistical Disclosure Control for Microdata Using the R-Package sdcMicro
The demand for high quality microdata for analytical purposes has grown rapidly among researchers and the public over the last few years. In order to respect existing laws on data ...
Matthias Templ
TISSEC
2008
202views more  TISSEC 2008»
13 years 8 months ago
A Framework for Identifying Compromised Nodes in Wireless Sensor Networks
compromised sensor nodes. The framework provides an appropriate abstraction of applicationspecific detection mechanisms and models the unique properties of sensor networks. Based o...
Qing Zhang, Ting Yu, Peng Ning
« Prev « First page 1819 / 1928 Last » Next »