Sciweavers

427 search results - page 59 / 86
» Applying Aspect-Orientation in Designing Security Systems: A...
Sort
View
SAC
2009
ACM
15 years 6 months ago
Taking total control of voting systems: firmware manipulations on an optical scan voting terminal
The firmware of an electronic voting machine is typically treated as a “trusted” component of the system. Consequently, it is misconstrued to be vulnerable only to an insider...
Seda Davtyan, Sotiris Kentros, Aggelos Kiayias, La...
110
Voted
EWCBR
2006
Springer
15 years 5 months ago
Combining Multiple Similarity Metrics Using a Multicriteria Approach
The design of a CBR system involves the use of similarity metrics. For many applications, various functions can be adopted to compare case features and to aggregate them into a glo...
Luc Lamontagne, Irène Abi-Zeid
111
Voted
MP
2002
110views more  MP 2002»
15 years 1 months ago
Robust optimization - methodology and applications
Abstract. Robust Optimization (RO) is a modeling methodology, combined with computational tools, to process optimization problems in which the data are uncertain and is only known ...
Aharon Ben-Tal, Arkadi Nemirovski
EATIS
2007
ACM
15 years 5 months ago
Analysing and enhancing business processes and IT-systems for mobile workforce automation: a framework approach
Mobile B2E-applications (business-to-employee) can add significant value to a company's business, when large workforce divisions are involved in the execution of certain busi...
Volker Gruhn, André Köhler
ENGL
2007
94views more  ENGL 2007»
15 years 1 months ago
Using Quality Function Deployment in Singulation Process Analysis
—This paper presents the application of quality function deployment (QFD) to process analysis. QFD has been applied in various industries since the 1960s, but traditional QFD met...
Hang-wai Law, Meng Hua