Sciweavers

1407 search results - page 164 / 282
» Systems Theory Model for Information Security
Sort
View
HICSS
2002
IEEE
89views Biometrics» more  HICSS 2002»
14 years 1 months ago
ICT-Impact on Services
The state of service management practice and the developments in ICT-efficiency research prompt the call for managerial relevance, normative theory building and the conceptualizat...
Alexander G. Bielowski, Rita Walczuch
CRYPTO
2000
Springer
134views Cryptology» more  CRYPTO 2000»
14 years 20 days ago
Taming the Adversary
Abstract. While there is a great deal of sophistication in modern cryptology, simple (and simplistic) explanations of cryptography remain useful and perhaps necessary. Many of the ...
Martín Abadi
BMCBI
2007
179views more  BMCBI 2007»
13 years 8 months ago
Automated smoother for the numerical decoupling of dynamics models
Background: Structure identification of dynamic models for complex biological systems is the cornerstone of their reverse engineering. Biochemical Systems Theory (BST) offers a pa...
Marco Vilela, Carlos Cristiano H. Borges, Susana V...
AOSE
2005
Springer
14 years 1 months ago
Requirements Elicitation for Agent-Based Applications
Requirements elicitation for a software system is a key stage in a successful development. At the same time, it is one of the most challenging, because requirements have to conside...
Rubén Fuentes, Jorge J. Gómez-Sanz, ...
WS
2005
ACM
14 years 1 months ago
Group-based key pre-distribution in wireless sensor networks
Many key pre-distribution techniques have been developed recently to establish pairwise keys for wireless sensor networks. To further improve these schemes, researchers have propo...
Donggang Liu, Peng Ning, Wenliang Du