Sciweavers

949 search results - page 139 / 190
» Relating Imperatives to Action
Sort
View
SDM
2009
SIAM
204views Data Mining» more  SDM 2009»
14 years 4 months ago
Application of Bayesian Partition Models in Warranty Data Analysis.
Automotive companies are forced to continuously extend and improve their product line-up. However, increasing diversity, higher design complexity, and shorter development cycles c...
Axel Blumenstock, Christoph Schlieder, Markus M&uu...
ICCD
2007
IEEE
140views Hardware» more  ICCD 2007»
14 years 4 months ago
A low overhead hardware technique for software integrity and confidentiality
Software integrity and confidentiality play a central role in making embedded computer systems resilient to various malicious actions, such as software attacks; probing and tamper...
Austin Rogers, Milena Milenkovic, Aleksandar Milen...
HICSS
2010
IEEE
187views Biometrics» more  HICSS 2010»
14 years 2 months ago
Virtual Micro-Politics: Informal Tactics of Influence and Power in Inter-Organizational Networks
Although virtual organizations and networks have been studied for quite some time, there is still need for research regarding their inner dynamics and the mechanisms of leadership...
Monique Janneck, Henning Staar
ACSC
2009
IEEE
14 years 2 months ago
Privacy-aware Access Control with Generalization Boundaries
Privacy is today an important concern for both data providers and data users. Data generalization can provide significant protection of an individual’s privacy, which means the...
Min Li, Hua Wang, Ashley W. Plank
OZCHI
2009
ACM
14 years 2 months ago
A study of email and SMS use in rural Indonesia
This paper describes a two-year research study that piloted and evaluated the use of low-cost, low-bandwidth Information and Communications Technology (ICT) to support meetings be...
Dean M. G. Hargreaves, Toni Robertson