Sciweavers

451 search results - page 21 / 91
» Identifying Facts for TCBR
Sort
View
WISTP
2009
Springer
15 years 4 months ago
Algebraic Attacks on RFID Protocols
Abstract. This work aims to identify the algebraic problems which enable many attacks on RFID protocols. Toward this goal, three emerging types of attacks on RFID protocols, concer...
Ton van Deursen, Sasa Radomirovic
DEXAW
2009
IEEE
111views Database» more  DEXAW 2009»
15 years 4 months ago
Integrating Security Patterns into the Electronic Invoicing Process
—The increasing automation of business processes is one of the main benefits of the ongoing technological evolution. Regarding e-invoices this automation process is still not op...
Michael Netter, Günther Pernul
TRUSTBUS
2009
Springer
15 years 4 months ago
Adaptive Dispatching of Incidences Based on Reputation for SCADA Systems
SCADA systems represent a challenging scenario where the management of critical alarms is crucial. Their response to these alarms should be efficient and fast in order to mitigate ...
Cristina Alcaraz, Isaac Agudo, M. Carmen Fern&aacu...
ICASSP
2008
IEEE
15 years 4 months ago
Portuguese variety identification on broadcast news
This paper describes an accent identification system for Portuguese, that explores different type of properties: acoustic, phonotactic and prosodic. The system is designed to be ...
Jean-Luc Rouas, Isabel Trancoso, Céu Viana,...
IWSM
2007
Springer
15 years 3 months ago
Preliminary Results in a Multi-site Empirical Study on Cross-Organizational ERP Size and Effort Estimation
This paper reports on initial findings in an empirical study carried out with representatives of two ERP vendors, six ERP adopting organizations, four ERP implementation consulting...
Maya Daneva