Sciweavers

1422 search results - page 146 / 285
» Information security and risk management
Sort
View
CORR
2010
Springer
60views Education» more  CORR 2010»
13 years 10 months ago
A Novel Scheme for Secured Data Transfer Over Computer Networks
: This paper presents a novel encryption-less algorithm to enhance security in transmission of data in networks. The algorithm uses an intuitively simple idea of a `jigsaw puzzle&#...
Rangarajan Vasudevan, Ajith Abraham, Sugata Sanyal
SOSP
2003
ACM
14 years 7 months ago
Samsara: honor among thieves in peer-to-peer storage
Peer-to-peer storage systems assume that their users consume resources in proportion to their contribution. Unfortunately, users are unlikely to do this without some enforcement m...
Landon P. Cox, Brian D. Noble
PRDC
2005
IEEE
14 years 4 months ago
On Automating Failure Mode Analysis and Enhancing its Integrity
This paper reports our experience on the development of a design-for-safety (DFS) workbench called Risk Assessment and Management Environment (RAME) for microelectronic avionics s...
Kam S. Tso, Ann T. Tai, Savio N. Chau, Leon Alkala...
EMISA
2005
Springer
14 years 3 months ago
Unbundling and Deploying CRM Applications as e-Services
: The development of Customer Relationship Management (CRM) capabilities by incrementally sourcing and combining “best of breed” services from different providers is a key leve...
Pedro R. Falcone Sampaio, Yong He
MLDM
2005
Springer
14 years 3 months ago
A Grouping Method for Categorical Attributes Having Very Large Number of Values
In supervised machine learning, the partitioning of the values (also called grouping) of a categorical attribute aims at constructing a new synthetic attribute which keeps the info...
Marc Boullé