Sciweavers

1416 search results - page 95 / 284
» cost 2009
Sort
View
HICSS
2009
IEEE
130views Biometrics» more  HICSS 2009»
14 years 4 months ago
A Model of Antecedents of RFID Adoption Intention in the Supply Chain
The application of the Radio Frequency Identification (RFID) technology in the supply chain has experienced increased attention in academic research and practice. There is, howeve...
Maria Madlberger
HICSS
2009
IEEE
106views Biometrics» more  HICSS 2009»
14 years 4 months ago
Transmission Tariffs by Use of System and Economic Benefits
Setting electric transmission tariffs is a classical multi-objective problem. The tariff problem is particularly challenging in modern power markets where transmission has been se...
Daniel J. Cámac, Raúl C. Bastidas, W...
HICSS
2009
IEEE
102views Biometrics» more  HICSS 2009»
14 years 4 months ago
Join the Standard Forces - Examining the Combined Impact of Process and Data Standards on Business Process Performance
What impact do process and data standards have on business process performance? This paper shows that process and data standards have a positive combined impact on business proces...
Bjoern Muenstermann, Andreas Eckhardt, Tim Weitzel
IEEEARES
2009
IEEE
14 years 4 months ago
Identity-Based Hybrid Signcryption
—Signcryption is a cryptographic primitive that fulfills both the functions of digital signature and public key encryption simultaneously, at a cost significantly lower than th...
Fagen Li, Masaaki Shirase, Tsuyoshi Takagi
IEEEARES
2009
IEEE
14 years 4 months ago
Identifying and Resolving Least Privilege Violations in Software Architectures
The implementation of security principles, like least privilege, in a software architecture is difficult, as no systematic rules on how to apply them in practice exist. As a resu...
Koen Buyens, Bart De Win, Wouter Joosen