Sciweavers

136 search results - page 18 / 28
» Identifying Crosscutting Concerns Using Fan-in Analysis
Sort
View
ECIS
2004
14 years 11 months ago
Change management: the contribution of personal construct theory (PCT)
This paper explores the use of two complementary approaches, each stemming from Personal Construct Theory (PCT), to investigate the interdependence of organizations and informatio...
Laurence Brooks, Christopher J. Davis, Mark Lycett
MP
1998
109views more  MP 1998»
14 years 9 months ago
Rounding algorithms for covering problems
In the last 25 years approximation algorithms for discrete optimization problems have been in the center of research in the fields of mathematical programming and computer science...
Dimitris Bertsimas, Rakesh V. Vohra
PAMI
2007
133views more  PAMI 2007»
14 years 9 months ago
Generating Cancelable Fingerprint Templates
—Biometrics-based authentication systems offer obvious usability advantages over traditional password and token-based authentication schemes. However, biometrics raises several p...
Nalini K. Ratha, Sharat Chikkerur, Jonathan H. Con...
DAC
2008
ACM
15 years 11 months ago
On the role of timing masking in reliable logic circuit design
Soft errors, once only of concern in memories, are beginning to affect logic as well. Determining the soft error rate (SER) of a combinational circuit involves three main masking ...
Smita Krishnaswamy, Igor L. Markov, John P. Hayes
ICMCS
2007
IEEE
131views Multimedia» more  ICMCS 2007»
15 years 4 months ago
Image Source Coding Forensics via Intrinsic Fingerprints
In this digital era, digital multimedia contents are often transmitted over networks without any protection. This raises serious security concerns since the receivers/subscribers ...
Wan-Yi Sabrina Lin, Steven Tjoa, H. Vicky Zhao, K....