Sciweavers

2363 search results - page 345 / 473
» How Secure is RFID
Sort
View
AINA
2006
IEEE
15 years 11 months ago
A Bulk-retrieval Technique for Effective Remote Monitoring in a Mobile Environment
For effective management it is necessary to have methods by which management applications can periodically retrieve large volumes of information from network devices. In this work...
Glenn Mansfield Keeni, Kazuhide Koide, Takeo Saito...
148
Voted
HICSS
2006
IEEE
94views Biometrics» more  HICSS 2006»
15 years 11 months ago
Reporting On-Campus Crime Online: User Intention to Use
National surveys demonstrate that millions of crimes go unreported in the United States. Several reasons may contribute to this lack of reporting and we are investigating these po...
Alicia Iriberri, Gondy Leroy, Nathan Garrett
150
Voted
HICSS
2006
IEEE
153views Biometrics» more  HICSS 2006»
15 years 11 months ago
IT Governance: Reviewing 17 IT Governance Tools and Analysing the Case of Novozymes A/S
Complexity in information technology architectures and infrastructures, and an increasing need for executives to verify and secure value generation processes in private as well as...
Michael Holm Larsen, Mogens Kühn Pedersen, Ki...
ICAS
2006
IEEE
145views Robotics» more  ICAS 2006»
15 years 11 months ago
A Model-Driven Development Framework for Non-Functional Aspects in Service Oriented Grids
Service-oriented grids are grid computing systems built with the notion of service-oriented architecture (SOA). Using two maract concepts, services and connections between service...
Hiroshi Wada, Junichi Suzuki, Katsuya Oba
ICNS
2006
IEEE
15 years 11 months ago
Building Distributed Access Control System Using Service-Oriented Programming Model
– Service-Oriented Programming Model is a new methodology for building service-oriented applications. In the Service-Oriented Programming Model, an application is assembled from ...
Ivan Zuzak, Sinisa Srbljic, Ivan Benc