Sciweavers

416 search results - page 6 / 84
» Intellectual Property and Open Systems
Sort
View
108
Voted
EUC
2005
Springer
15 years 9 months ago
Program Obfuscation Scheme Using Random Numbers to Complicate Control Flow
Abstract. For the security technology that has been achieved with software in the computer system and the protection of the intellectual property right of software, software protec...
Tatsuya Toyofuku, Toshihiro Tabata, Kouichi Sakura...
91
Voted
DATASCIENCE
2006
105views more  DATASCIENCE 2006»
15 years 3 months ago
Data publication in the open access initiative
The `Berlin Declaration' was published in 2003 as a guideline to policy makers to promote the Internet as a functional instrument for a global scientific knowledge base. Beca...
Jens Klump, Roland Bertelmann, Jan Brase, Michael ...
113
Voted
HICSS
2009
IEEE
99views Biometrics» more  HICSS 2009»
15 years 10 months ago
Using Knowledge Management Systems to Structure Knowledgeable Practices
The purpose of this study is to explore the role of knowledge management systems (KMS) in structuring knowledgeable practices within organizations. Specifically, we consider how i...
Chad Saunders, Mike Chiasson
127
Voted
ISCAS
2006
IEEE
135views Hardware» more  ISCAS 2006»
15 years 9 months ago
A sensor system on chip for wireless microsystems
Recent years have seen the rapid development of microsensor technology, system on chip design, wireless technology and ubiquitous computing. When assembled into a complex microsys...
L. Wang, Nizamettin Aydin, A. Astaras, M. Ahmadian...
134
Voted
SAC
2009
ACM
15 years 10 months ago
Secure web-based retrieval of documents with usage controls
Usage controls enable the provider of some information to limit how recipients may use it. Usage controls may be desirable in enterprise environments, e.g., for regulatory complia...
Peter Djalaliev, José Carlos Brustoloni