Sciweavers

1834 search results - page 307 / 367
» Public Key Cryptography
Sort
View
HICSS
2006
IEEE
101views Biometrics» more  HICSS 2006»
14 years 1 months ago
IT Projects: Conflict, Governance, and Systems Thinking
Triggered by several embarrassing (and costly) IT project collapses in New Zealand’s public sector, a government report found that effective project control required good govern...
David Johnstone, Sid L. Huff, Beverley G. Hope
HICSS
2006
IEEE
100views Biometrics» more  HICSS 2006»
14 years 1 months ago
The Impact of Social Types within Information Communities: Findings from Technical Newsgroups
We explored whether Fisher and Durrance’s [11] framework of information communities applies to online technical newsgroups and the impact of particular social types on informati...
Tammara Combs Turner, Karen E. Fisher
ISM
2006
IEEE
95views Multimedia» more  ISM 2006»
14 years 1 months ago
Digital Rights Management for Video Sensor Network
Video sensor network is evolving from an isolated system to an integral component of the global information infrastructure. In this paper, we argue that when video sensor network ...
Taojun Wu, Liang Dai, Yuan Xue, Yi Cui
SP
2006
IEEE
102views Security Privacy» more  SP 2006»
14 years 1 months ago
Secure Device Pairing based on a Visual Channel (Short Paper)
Recently several researchers and practitioners have begun to address the problem of how to set up secure communication between two devices without the assistance of a trusted thir...
Nitesh Saxena, Jan-Erik Ekberg, Kari Kostiainen, N...
ASPDAC
2006
ACM
100views Hardware» more  ASPDAC 2006»
14 years 1 months ago
Generation of shorter sequences for high resolution error diagnosis using sequential SAT
Commonly used pattern sources in simulation-based verification include random, guided random, or design verification patterns. Although these patterns may help bring the design ...
Sung-Jui (Song-Ra) Pan, Kwang-Ting Cheng, John Moo...