Sciweavers

173 search results - page 27 / 35
» Modelling Quality of Protection in Outsourced Business Proce...
Sort
View
SP
2007
IEEE
108views Security Privacy» more  SP 2007»
15 years 9 months ago
Trojan Detection using IC Fingerprinting
Hardware manufacturers are increasingly outsourcing their IC fabrication work overseas due to much lower costs. This poses a significant security risk for ICs used for critical m...
Dakshi Agrawal, Selçuk Baktir, Deniz Karako...
106
Voted
HICSS
2002
IEEE
87views Biometrics» more  HICSS 2002»
15 years 8 months ago
Using Enterprise Reference Models for Automated ISO 9000 Compliance Evaluation
A computational enterprise model representing key facets of an organization can be an effective tool. For example, a specific organization's quality management business proce...
Henry M. Kim, Mark S. Fox
TKDE
2011
168views more  TKDE 2011»
14 years 10 months ago
On Computing Farthest Dominated Locations
—In reality, spatial objects (e.g., hotels) not only have spatial locations but also have quality attributes (e.g., price, star). An object p is said to dominate another one p , ...
Hua Lu, Man Lung Yiu
WECWIS
2005
IEEE
79views ECommerce» more  WECWIS 2005»
15 years 9 months ago
Enabling DRM-Preserving Digital Content Redistribution
Traditionally, the process of online digital content distribution has involved a limited number of centralised distributors selling protected contents and licenses authorising the...
Srijith Krishnan Nair, Bogdan C. Popescu, Chandana...
90
Voted
ISTA
2007
15 years 4 months ago
Knowledge-Oriented Approach to the Main Pipeline Complex Dispatching Control
: The article is devoted to the development of knowledge-oriented models that are able to increase the efficiency and quality of main pipeline complex (MPC) dispatching control. Th...
O. Ye. Fedorovich, A. V. Prokhorov, K. V. Golovan