Sciweavers

1530 search results - page 234 / 306
» Design and Implementation of a Key-Lifecycle Management Syst...
Sort
View
ECIS
2004
15 years 4 months ago
A conceptual framework of e-fraud control in an integrated supply chain
The integration of supply chains offers many benefits; yet, it may also render organisations more vulnerable to electronic fraud (e-fraud). E-fraud can drain on organisations'...
Lucian Vasiu
145
Voted
TC
2008
15 years 3 months ago
Secure Memory Accesses on Networks-on-Chip
Security is gaining relevance in the development of embedded devices. Toward a secure system at each level of design, this paper addresses security aspects related to Network-on-Ch...
Leandro Fiorin, Gianluca Palermo, Slobodan Lukovic...
139
Voted
BIRTHDAY
2007
Springer
15 years 7 months ago
Deriving Specifications for Systems That Are Connected to the Physical World
Well understood methods exist for developing programs from formal specifications. Not only do such methods offer a precise check that certain sorts of deviations from their specifi...
Cliff B. Jones, Ian J. Hayes, Michael A. Jackson
SIGMOD
2009
ACM
172views Database» more  SIGMOD 2009»
15 years 10 months ago
Self-organizing tuple reconstruction in column-stores
Column-stores gained popularity as a promising physical design alternative. Each attribute of a relation is physically stored as a separate column allowing queries to load only th...
Stratos Idreos, Martin L. Kersten, Stefan Manegold
140
Voted
IFIP
1998
Springer
15 years 7 months ago
Migrating Objects in Electronic Commerce Applications
Electronic Commerce is a field of application that is distributed by nature where different parties share information and work concurrently and cooperatively on objects, potential...
Marko Boger