Sciweavers

173 search results - page 27 / 35
» Modelling Quality of Protection in Outsourced Business Proce...
Sort
View
SP
2007
IEEE
108views Security Privacy» more  SP 2007»
14 years 2 months ago
Trojan Detection using IC Fingerprinting
Hardware manufacturers are increasingly outsourcing their IC fabrication work overseas due to much lower costs. This poses a significant security risk for ICs used for critical m...
Dakshi Agrawal, Selçuk Baktir, Deniz Karako...
HICSS
2002
IEEE
87views Biometrics» more  HICSS 2002»
14 years 1 months ago
Using Enterprise Reference Models for Automated ISO 9000 Compliance Evaluation
A computational enterprise model representing key facets of an organization can be an effective tool. For example, a specific organization's quality management business proce...
Henry M. Kim, Mark S. Fox
TKDE
2011
168views more  TKDE 2011»
13 years 3 months ago
On Computing Farthest Dominated Locations
—In reality, spatial objects (e.g., hotels) not only have spatial locations but also have quality attributes (e.g., price, star). An object p is said to dominate another one p , ...
Hua Lu, Man Lung Yiu
WECWIS
2005
IEEE
79views ECommerce» more  WECWIS 2005»
14 years 2 months ago
Enabling DRM-Preserving Digital Content Redistribution
Traditionally, the process of online digital content distribution has involved a limited number of centralised distributors selling protected contents and licenses authorising the...
Srijith Krishnan Nair, Bogdan C. Popescu, Chandana...
ISTA
2007
13 years 10 months ago
Knowledge-Oriented Approach to the Main Pipeline Complex Dispatching Control
: The article is devoted to the development of knowledge-oriented models that are able to increase the efficiency and quality of main pipeline complex (MPC) dispatching control. Th...
O. Ye. Fedorovich, A. V. Prokhorov, K. V. Golovan