Sciweavers

1575 search results - page 289 / 315
» The provenance of electronic data
Sort
View
DATE
2008
IEEE
223views Hardware» more  DATE 2008»
14 years 4 months ago
Cooperative Safety: a Combination of Multiple Technologies
—Governmental Transportation Authorities' interest in Car to Car and Car to Infrastructure has grown dramatically over the last few years in order to increase the road safet...
Raffaele Penazzi, Piergiorgio Capozio, Martin Dunc...
NDSS
2008
IEEE
14 years 4 months ago
Analysis-Resistant Malware
Traditionally, techniques for computing on encrypted data have been proposed with privacy preserving applications in mind. Several current cryptosystems support a homomorphic oper...
John Bethencourt, Dawn Song, Brent Waters
ATAL
2007
Springer
14 years 4 months ago
Using Information Gain to Analyze and Fine Tune the Performance of Supply Chain Trading Agents
The Supply Chain Trading Agent Competition (TAC SCM) was designed to explore approaches to dynamic supply chain trading. During the course of each year’s competition historical d...
James Andrews, Michael Benisch, Alberto Sardinha, ...
CASES
2006
ACM
14 years 3 months ago
Automated compile-time and run-time techniques to increase usable memory in MMU-less embedded systems
Random access memory (RAM) is tightly-constrained in many embedded systems. This is especially true for the least expensive, lowest-power embedded systems, such as sensor network ...
Lan S. Bai, Lei Yang, Robert P. Dick
ACMICEC
2004
ACM
106views ECommerce» more  ACMICEC 2004»
14 years 3 months ago
Measuring e-government impact: existing practices and shortcomings
Public administrations of all over the world invest an enormous amount of resources in e-government. How the success of egovernment can be measured is often not clear. E-governmen...
Rob M. Peters, Marijn Janssen, Tom M. van Engers