Sciweavers

557 search results - page 27 / 112
» Two experiences designing for effective security
Sort
View
NDSS
2005
IEEE
14 years 2 months ago
Security Analysis and Improvements for IEEE 802.11i
This paper analyzes the IEEE 802.11i wireless networking standard with respect to data confidentiality, integrity, mutual authentication, and availability. Under our threat model,...
Changhua He, John C. Mitchell
ISCAS
2002
IEEE
149views Hardware» more  ISCAS 2002»
14 years 1 months ago
Design of a DSP-based 24 bit digital audio equalizer for automotive applications
The project deals with the design and realization of a dedicated board DSP-based for the processing of audio signals for automotive applications (DIGIcar). The I/O interface of th...
Alberto Bellini, Eraldo Carpanoni, Giacomo Frassi,...
SIMPRA
2008
94views more  SIMPRA 2008»
13 years 8 months ago
A simulation based experimental design to analyze factors affecting production flow time
In this paper we analyze and evaluate the effects of some pre-defined process parameters on the performance of a manufacturing system. These parameters include two different plant...
Banu Y. Ekren, Arslan M. Ornek
WWW
2010
ACM
13 years 8 months ago
Anonymizing user profiles for personalized web search
We study the problem of anonymizing user profiles so that user privacy is sufficiently protected while the anonymized profiles are still effective in enabling personalized web sea...
Yun Zhu, Li Xiong, Christopher Verdery
ECIS
2003
13 years 10 months ago
The method evaluation model: a theoretical model for validating information systems design methods
Information Systems (IS) design research tends to emphasise the development of new methods (normative research), while addressing the evaluation of methods in only a limited fashi...
Daniel L. Moody