Sciweavers

132 search results - page 8 / 27
» Polite Theories Revisited
Sort
View
HICSS
2009
IEEE
119views Biometrics» more  HICSS 2009»
14 years 2 months ago
Information Sharing at National Borders: Extending the Utility of Border Theory
Research has identified the potential and challenges of information sharing in government settings mostly within the context of a single country. The challenges facing inter-gover...
Celene Navarrete, Sehl Mellouli, Theresa A. Pardo,...
MST
2010
117views more  MST 2010»
13 years 2 months ago
The 1-Versus-2 Queries Problem Revisited
The 1-versus-2 queries problem, which has been extensively studied in computational complexity theory, asks in its generality whether every efficient algorithm that makes at most 2...
Rahul Tripathi
ICIS
1997
13 years 8 months ago
An information company in Mexico: extending the resource-based view of the firm
This paper extends the resource-based view of the firm to a less developed country situation by challenging three boundary conditions associated with the theory: first, the theory...
Sirkka L. Jarvenpaa, Dorothy E. Leidner
EMS
2008
IEEE
13 years 9 months ago
Threat Modeling Revisited: Improving Expressiveness of Attack
Threat modeling plays an important role in the deployment of optimal security controls and a number of threat modeling techniques have been proposed. However, most of the existing...
Drake Patrick Mirembe, Maybin K. Muyeba
CORR
2010
Springer
62views Education» more  CORR 2010»
13 years 7 months ago
Guessing Revisited: A Large Deviations Approach
The problem of guessing a random string is revisited and some prior results on guessing exponents are re-derived using the theory of large deviations. It is shown that if the seque...
Manjesh Kumar Hanawal, Rajesh Sundaresan