Sciweavers

2763 search results - page 77 / 553
» The Dangerous 'All' in Specifications
Sort
View
PERCOM
2005
ACM
14 years 8 months ago
A Scalable and Provably Secure Hash-Based RFID Protocol
The biggest challenge for RFID technology is to provide benefits without threatening the privacy of consumers. Many solutions have been suggested but almost as many ways have been...
Gildas Avoine, Philippe Oechslin
OOPSLA
2009
Springer
14 years 3 months ago
Model transformation by demonstration
Model transformations provide a powerful capability to automate model refinements. However, the use of model transformation languages may present challenges to those who are unfami...
Yu Sun
DATE
2008
IEEE
99views Hardware» more  DATE 2008»
14 years 3 months ago
Subsystem Exchange in a Concurrent Design Process Environment
This paper provides insight into the novel solutions used to build SoCs targeting increased productivity in a complex environment. Design of such SoCs relies on multi-team, multi-...
Marino Strik, Alain Gonier, Paul Williams
HICSS
2008
IEEE
165views Biometrics» more  HICSS 2008»
14 years 3 months ago
CRM and Customer Portfolio Management for E-Tailers
“Don’t put all your eggs in one basket” is common wisdom with respect to financial portfolio theory. The configuration of customer portfolios with regard to appropriate risk...
Dennis Kundisch, Stefan Sackmann, Markus Ruch
WETICE
2008
IEEE
14 years 3 months ago
Federated Collaborations with Exertions
This paper describes a service-oriented P2P architecture and related federated metaprogramming model to support development of highly scalable and reliable distributed collaborati...
Michael W. Sobolewski