Sciweavers

2159 search results - page 43 / 432
» C-K design theory for information systems research
Sort
View
125
Voted
EIT
2008
IEEE
15 years 3 months ago
Experiments in attacking FPGA-based embedded systems using differential power analysis
Abstract--In the decade since the concept was publicly introduced, power analysis attacks on cryptographic systems have become an increasingly studied topic in the computer securit...
Song Sun, Zijun Yan, Joseph Zambreno
107
Voted
HICSS
2005
IEEE
188views Biometrics» more  HICSS 2005»
15 years 7 months ago
Developing Group Decision Support Systems for Deception Detection
Achieving information assurance and security is a complex and challenging task, which is crucial from national and personal security point of views. Research in detecting deceptiv...
Amit V. Deokar, Therani Madhusudan
156
Voted
CANDC
2009
ACM
14 years 11 months ago
Designing to support reasoned imagination through embodied metaphor
Supporting users' reasoned imagination in sense making during interaction with tangible and embedded computation involves supporting the application of their existing mental ...
Alissa Nicole Antle, Greg Corness, Saskia Bakker, ...
138
Voted
CRIWG
2007
15 years 3 months ago
Deployment of Ontologies for an Effective Design of Collaborative Learning Scenarios
Two of the most important research subjects during the development of intelligent authoring systems (IAS) for education are the modeling of knowledge and the extraction of knowledg...
Seiji Isotani, Riichiro Mizoguchi
ICIC
2007
Springer
15 years 8 months ago
Uncertainty Measures of Roughness of Knowledge and Rough Sets in Ordered Information Systems
Rough set theory has been considered as a useful tool to deal with inexact, uncertain, or vague knowledge. However, in real-world, most of information systems are based on dominanc...
Wei-Hua Xu, Hong-zhi Yang, Wen-Xiu Zhang