Sciweavers

3717 search results - page 51 / 744
» Representing Multiple Theories
Sort
View
AICCSA
2005
IEEE
91views Hardware» more  AICCSA 2005»
14 years 2 months ago
Secure transmission of sensitive data using multiple channels
A new scheme for transmitting sensitive data is proposed, the proposed scheme depends on partitioning the output of a block encryption module using the Chinese Remainder Theorem a...
Abdelhamid S. Abdelhamid, Ahmed A. Belal
ILP
2000
Springer
14 years 17 days ago
Induction of Recursive Theories in the Normal ILP Setting: Issues and Solutions
Induction of recursive theories in the normal ILP setting is a complex task because of the non-monotonicity of the consistency property. In this paper we propose computational solu...
Floriana Esposito, Donato Malerba, Francesca A. Li...
ECIS
2003
13 years 10 months ago
An alternative theory of legacy information systems
Organisational dependence upon IT continues to grow yet experiences of satisfaction vary widely. Problematic, aged IT is often cited as being a fundamental problem in this respect...
Ben Light
EOR
2006
123views more  EOR 2006»
13 years 9 months ago
Double-layered dynamics: A unified theory of projected dynamical systems and evolutionary variational inequalities
In this paper we continue the study of the unified dynamics resulting from the theory of projected dynamical systems and evolutionary variational inequalities, initiated by Cojocar...
Monica-Gabriela Cojocaru, Patrizia Daniele, Anna N...
HICSS
2008
IEEE
181views Biometrics» more  HICSS 2008»
14 years 3 months ago
Systems Theory Model for Information Security
Architecting security solutions for today’s diverse computer systems is a challenge. The modern business environment is comprised of many different applications, e-mail, databas...
Wm. Arthur Conklin, Glenn B. Dietrich