Sciweavers

7117 search results - page 48 / 1424
» IT Governance Frameworks as Methods
Sort
View
ACL
2003
15 years 13 days ago
Deverbal Compound Noun Analysis Based on Lexical Conceptual Structure
This paper proposes a principled approach for analysis of semantic relations between constituents in compound nouns based on lexical semantic structure. One of the difficulties o...
Koichi Takeuchi, Kyo Kageura, Teruo Koyama
CCS
1994
ACM
15 years 3 months ago
Protocol Failure in the Escrowed Encryption Standard
The Escrowed Encryption Standard (EES) defines a US Government family of cryptographic processors, popularly known as "Clipper" chips, intended to protect unclassified g...
Matt Blaze
CRYPTO
1992
Springer
181views Cryptology» more  CRYPTO 1992»
15 years 3 months ago
Fair Public-Key Cryptosystems
Abstract Joseph Kilian NEC Research Princeton, NJ 08540 Tom Leighton Mathematics Department Laboratory for Computer Science MIT Cambridge, MA 02139 August 17, 1994 Fair" Publ...
Silvio Micali
EVOTING
2004
89views Hardware» more  EVOTING 2004»
15 years 13 days ago
E-Voting and the Architecture of Virtual Space
: One of the basic principles of architecture is that of the relation between function and form. It is a common fact that in most cases form reveals or refers to function. Thus by ...
Anthoula Maidou, Hariton M. Polatoglou
JTAER
2007
90views more  JTAER 2007»
14 years 11 months ago
One-size e-business adoption model does not fit all
This empirical study of organisational e-business adoption, utilising both qualitative and quantitative data collection methods, examines four major factors influencing adoption i...
Barbara Roberts, Mark Toleman