Sciweavers

1544 search results - page 185 / 309
» The Process of Adoption
Sort
View
SWS
2005
ACM
15 years 9 months ago
Web services enterprise security architecture: a case study
Web Services (WS hereafter) Security is a crucial aspect for technologies based on this paradigm to be completely adopted by the industry. As a consequence, a lot of initiatives h...
Carlos Gutiérrez, Eduardo Fernández-...
IQ
2007
15 years 5 months ago
Assessing Information Quality In A RFID-Integrated Shelf Replenishment Decision Support System For The Retail Industry
: Motivated by the problem of out-of-shelf (OOS) in retail industry and the emergence of RFID (Radio Frequency Identification) technology, this paper investigates the impact that t...
Cleopatra Bardaki, Katerina Pramatari
ESANN
2003
15 years 5 months ago
Approximately unbiased estimation of conditional variance in heteroscedastic kernel ridge regression
In this paper we extend a form of kernel ridge regression for data characterised by a heteroscedastic noise process (introduced in Foxall et al. [1]) in order to provide approxima...
Gavin C. Cawley, Nicola L. C. Talbot, Robert J. Fo...
CHES
2006
Springer
146views Cryptology» more  CHES 2006»
15 years 7 months ago
Path Swapping Method to Improve DPA Resistance of Quasi Delay Insensitive Asynchronous Circuits
This paper presents a Path Swapping (PS) method which enables to enhance the security of Quasi Delay Insensitive Asynchronous Circuits against Power Analysis (PA) attack. This appr...
G. Fraidy Bouesse, Gilles Sicard, Marc Renaudin
CORR
2010
Springer
172views Education» more  CORR 2010»
15 years 3 months ago
Alternating-Offer Bargaining Games over the Gaussian Interference Channel
This paper tackles the problem of how two selfish users jointly determine the operating point in the achievable rate region of a two-user Gaussian interference channel through barg...
Xi Liu, Elza Erkip