Sciweavers

416 search results - page 6 / 84
» Intellectual Property and Open Systems
Sort
View
EUC
2005
Springer
14 years 27 days ago
Program Obfuscation Scheme Using Random Numbers to Complicate Control Flow
Abstract. For the security technology that has been achieved with software in the computer system and the protection of the intellectual property right of software, software protec...
Tatsuya Toyofuku, Toshihiro Tabata, Kouichi Sakura...
DATASCIENCE
2006
105views more  DATASCIENCE 2006»
13 years 7 months ago
Data publication in the open access initiative
The `Berlin Declaration' was published in 2003 as a guideline to policy makers to promote the Internet as a functional instrument for a global scientific knowledge base. Beca...
Jens Klump, Roland Bertelmann, Jan Brase, Michael ...
HICSS
2009
IEEE
99views Biometrics» more  HICSS 2009»
14 years 2 months ago
Using Knowledge Management Systems to Structure Knowledgeable Practices
The purpose of this study is to explore the role of knowledge management systems (KMS) in structuring knowledgeable practices within organizations. Specifically, we consider how i...
Chad Saunders, Mike Chiasson
ISCAS
2006
IEEE
135views Hardware» more  ISCAS 2006»
14 years 1 months ago
A sensor system on chip for wireless microsystems
Recent years have seen the rapid development of microsensor technology, system on chip design, wireless technology and ubiquitous computing. When assembled into a complex microsys...
L. Wang, Nizamettin Aydin, A. Astaras, M. Ahmadian...
SAC
2009
ACM
14 years 2 months ago
Secure web-based retrieval of documents with usage controls
Usage controls enable the provider of some information to limit how recipients may use it. Usage controls may be desirable in enterprise environments, e.g., for regulatory complia...
Peter Djalaliev, José Carlos Brustoloni