Sciweavers

906 search results - page 90 / 182
» Chain Dominated Orders
Sort
View
HICSS
2008
IEEE
95views Biometrics» more  HICSS 2008»
15 years 6 months ago
Enterprise Information Systems and Strategic Flexibility
Strategic flexibility is a critical organizational competency in today’s dynamic global environment. This paper explores the impact of enterprise information systems on an organ...
William MacKinnon, Gerald Grant, David Cray
SACI
2007
IEEE
15 years 6 months ago
Implementation of an Authentication Protocol for Sending Audio-Video Information in Java
— an application for assuring the authenticity of audio-video information is developed. The application is implemented in Java by using Java Media Framework to send audio and vid...
Bogdan Groza, Dorina Petrica, Simona Barbu, Marian...
ACISP
2007
Springer
15 years 6 months ago
A Practical System for Globally Revoking the Unlinkable Pseudonyms of Unknown Users
We propose the first single sign-on system in which a user can access services using unlinkable digital pseudonyms that can all be revoked in case she abuses any one service. Our ...
Stefan Brands, Liesje Demuynck, Bart De Decker
CSL
2007
Springer
15 years 6 months ago
Forest Expressions
We define regular expressions for unranked trees (actually, ordered sequences of unranked trees, called forests). These are compared to existing regular expressions for trees. On ...
Mikolaj Bojanczyk
DEXA
2007
Springer
96views Database» more  DEXA 2007»
15 years 6 months ago
Data Management in RFID Applications
Nowadays, RFID applications have attracted a great deal of interest due to their increasing adoptions in supply chain management, logistics and security. They have posed many new c...
Dan Lin, Hicham G. Elmongui, Elisa Bertino, Beng C...