Sciweavers

713 search results - page 120 / 143
» A reference model for IT management responsibilities
Sort
View
TISSEC
2008
202views more  TISSEC 2008»
14 years 9 months ago
A Framework for Identifying Compromised Nodes in Wireless Sensor Networks
compromised sensor nodes. The framework provides an appropriate abstraction of applicationspecific detection mechanisms and models the unique properties of sensor networks. Based o...
Qing Zhang, Ting Yu, Peng Ning
JCM
2007
143views more  JCM 2007»
14 years 9 months ago
A Simple Privacy Protecting Scheme Enabling Delegation and Ownership Transfer for RFID Tags
— RFID (Radio frequency identification) technology raises many privacy concerns among which the potential tracking of an RFID tag bearer and the eventuality of an illegitimate r...
Sepideh Fouladgar, Hossam Afifi
TOSEM
2008
117views more  TOSEM 2008»
14 years 9 months ago
Power laws in software
e than previously established, appearing at various levels of abstraction, in diverse systems and languages. The implications of this phenomenon cover various aspects of software e...
Panagiotis Louridas, Diomidis Spinellis, Vasileios...
64
Voted
NAR
1998
112views more  NAR 1998»
14 years 9 months ago
MITOMAP: a human mitochondrial genome database--1998 update
We have continued to develop MITOMAP (http://www.gen.emory.edu/MITOMAP ), a comprehensive database for the human mitochondrial DNA (mtDNA). MITOMAP uses the mtDNA sequence as the ...
Andreas M. Kogelnik, Marie T. Lott, Michael D. Bro...
SCHEDULING
2010
116views more  SCHEDULING 2010»
14 years 8 months ago
On supporting Lean methodologies using constraint-based scheduling
Lean Manufacturing often simply referred to as Lean is a process management philosophy that aims to improve the way in which products are manufactured. It does this through ide...
Roman van der Krogt, John Geraghty, Mustafa Ramzi ...