Sciweavers

592 search results - page 93 / 119
» Information Technology, Responsibility, and Anthropology
Sort
View
DAC
2010
ACM
13 years 11 months ago
Quality metric evaluation of a physical unclonable function derived from an IC's power distribution system
The level of security provided by digital rights management functions and cryptographic protocols depend heavily on the security of an embedded secret key. The current practice of...
Ryan Helinski, Dhruva Acharyya, Jim Plusquellic
PRICAI
2000
Springer
13 years 11 months ago
Virtual Enterprise Design - BDI Agents vs. Objects
Current research identifying architectures for a virtual enterprise has moved from information modelling to role modelling. Thus, a high level of autonomy results from the distribu...
Iyad Rahwan, Ryszard Kowalczyk, Yun Yang
CIDR
2007
101views Algorithms» more  CIDR 2007»
13 years 8 months ago
The Data Ring: Community Content Sharing
Information ubiquity has created a large crowd of users (most notably scientists), who could employ DBMS technology to process and share their data more effectively. Still, this ...
Serge Abiteboul, Neoklis Polyzotis
AISM
2004
13 years 8 months ago
Approaches to IT Security in Small and Medium Enterprises
Organisations of all sizes are now significantly reliant upon information technology and networks for the operation of their business activities. All therefore have a consequent r...
Vassilis Dimopoulos, Steven Furnell, Murray Jennex...
APVIS
2006
13 years 8 months ago
SnapShoot: integrating semantic analysis and visualization techniques for web-based note taking system
We have many application software today to support reading and writing respectively. However, we believe that few applications available today fully support both reading and writi...
Soichiro Iga, Makoto Shinnishi