Sciweavers

446 search results - page 1 / 90
» Who's Got the Key
Sort
View
SIGUCCS
1999
ACM
13 years 11 months ago
Who's Got the Key?
This paper attempts to illuminate several fundamental concepts used in the creation of a Public Key Infrastructure (PKI). These concepts include encryption, public key cryptograph...
David Henry
IOR
2002
179views more  IOR 2002»
13 years 6 months ago
Decision Analysis: A Personal Account of How It Got Started and Evolved
Then these analytically motivated abstractions were gradually made more intricate as the body of mathematical techniques grew. The trend went from elementary analysis of complex, i...
Howard Raiffa
ICDM
2006
IEEE
102views Data Mining» more  ICDM 2006»
14 years 1 months ago
Who Thinks Who Knows Who? Socio-cognitive Analysis of Email Networks
Interpersonal interaction plays an important role in organizational dynamics, and understanding these interaction networks is a key issue for any organization, since these can be ...
Nishith Pathak, Sandeep Mane, Jaideep Srivastava
ICCV
2011
IEEE
12 years 7 months ago
Who Blocks Who: Simultaneous Clothing Segmentation for Grouping Images
Clothing is one of the most informative cues of human appearance. In this paper, we propose a novel multi-person clothing segmentation algorithm for highly occluded images. The ke...
Wang Nan, Haizhou Ai
19
Voted
ECIS
2004
13 years 8 months ago
SMEs and internet adoption strategy: who do SMEs listen to?
Governments have developed policies and strategies which are designed to assist SMEs to become eenabled. It is not clear what impact these strategies have on SMEs. There is some e...
Martin Beckinsale, Margi Levy