Sciweavers

30 search results - page 5 / 6
» Exploring the transaction dimensions of supply chain managem...
Sort
View
USS
2008
13 years 8 months ago
Unidirectional Key Distribution Across Time and Space with Applications to RFID Security
We explore the problem of secret-key distribution in unidirectional channels, those in which a sender transmits information blindly to a receiver. We consider two approaches: (1) ...
Ari Juels, Ravikanth Pappu, Bryan Parno
TASE
2008
IEEE
13 years 5 months ago
Mechanism Design for Single Leader Stackelberg Problems and Application to Procurement Auction Design
In this paper, we focus on mechanism design for single leader Stackelberg problems, which are a special case of hierarchical decision making problems in which a distinguished agent...
Dinesh Garg, Y. Narahari
HICSS
2006
IEEE
110views Biometrics» more  HICSS 2006»
13 years 11 months ago
Risk Factors in Distributed Projects
In this manuscript we develop a conceptual understanding of how key risk factors associated with Information Technology development projects are magnified or multiplied when deali...
James M. Erickson, Roberto Evaristo
ISJ
2010
13 years 3 months ago
User involvement in developing mobile and temporarily interconnected systems
Information systems (IS) research on user involvement has primarily theorized relationships between developers, managers and users in systems development. However, so far, marginal...
Ola Henfridsson, Rikard Lindgren
ICEIS
2009
IEEE
13 years 3 months ago
Mining Patterns in the Presence of Domain Knowledge
One of the main difficulties of pattern mining is to deal with items of different nature in the same itemset, which can occur in any domain except basket analysis. Indeed, if we co...
Cláudia Antunes