Sciweavers

1407 search results - page 115 / 282
» Systems Theory Model for Information Security
Sort
View
IJMMS
2006
83views more  IJMMS 2006»
13 years 8 months ago
Understanding e-learning continuance intention: An extension of the Technology Acceptance Model
Based on the expectancy disconfirmation theory, this study proposes a decomposed technology acceptance model in the context of an e-learning service. In the proposed model, the pe...
Juan Carlos Roca, Chao-Min Chiu, Francisco Jos&eac...
CSFW
2010
IEEE
13 years 11 months ago
Formal Verification of Privacy for RFID Systems
RFID tags are being widely employed in a variety of applications, ranging from barcode replacement to electronic passports. Their extensive use, however, in combination with their ...
Mayla Brusò, Konstantinos Chatzikokolakis, ...
EUSFLAT
2009
134views Fuzzy Logic» more  EUSFLAT 2009»
13 years 6 months ago
Flow Line Systems with Possibilistic Data: a System with Waiting Time in Line Uncertain
This paper proposes to analyze two flow line systems in which we include possibilistic data -the priority-discipline is possibilistic instead of probabilistic- and measure the perf...
David de la Fuente, María José Pardo
ACL
2011
12 years 11 months ago
Integrating surprisal and uncertain-input models in online sentence comprehension: formal techniques and empirical results
A system making optimal use of available information in incremental language comprehension might be expected to use linguistic knowledge together with current input to revise beli...
Roger Levy
EIT
2008
IEEE
13 years 10 months ago
Experiments in attacking FPGA-based embedded systems using differential power analysis
Abstract--In the decade since the concept was publicly introduced, power analysis attacks on cryptographic systems have become an increasingly studied topic in the computer securit...
Song Sun, Zijun Yan, Joseph Zambreno