Sciweavers

1224 search results - page 61 / 245
» Theory decision by decomposition
Sort
View
HICSS
2002
IEEE
124views Biometrics» more  HICSS 2002»
14 years 2 months ago
Designing Information Technology Governance Processes: Diagnosing Contemporary Practices and Competing Theories
Whereas previous studies have been primarily focused on the structural features of Information Technology governance, this paper describes an exploratory study of IT governance pr...
Pieter M. A. Ribbers, Ryan Peterson, Marylin M. Pa...
ASIAN
2006
Springer
133views Algorithms» more  ASIAN 2006»
14 years 1 months ago
Normal Proofs in Intruder Theories
Given an arbitrary intruder deduction capability, modeled as an inference system S and a protocol, we show how to compute an inference system bS such that the security problem for ...
Vincent Bernat, Hubert Comon-Lundh
FLAIRS
2003
13 years 11 months ago
Low Level Fusion of Imagery Based on Dempster-Shafer Theory
An approach to fuse multiple images based on Dempster-Shafer evidential reasoning is proposed in this article. Dempster-Shafer theory provides a complete framework for combining w...
Xiaohui Yuan, Jian Zhang 0007, Xiaojing Yuan, Bill...
IAT
2010
IEEE
13 years 8 months ago
Risk Analysis in Access Control Systems Based on Trust Theories
There is a need for research on the scientific base and engineering requirements for building trustworthy systems in dynamic environments. To address this need, we study risk analy...
J. Ma, Luigi Logrippo, Kamel Adi, Serge Mankovski
ICMB
2005
IEEE
136views Business» more  ICMB 2005»
14 years 3 months ago
Mobile Recommendation Systems for Decision Making "On the Go"
This paper discusses the functional and technological opportunities associated with mobile recommendation systems. These are systems that help a mobile user or a group of mobile u...
Hans van der Heijden, Gabriele Kotsis, Reinhard Kr...