Sciweavers

389 search results - page 44 / 78
» Information Flow in the Peer-Reviewing Process
Sort
View
BPM
2006
Springer
153views Business» more  BPM 2006»
15 years 1 months ago
Shop Floor Information Management and SOA
Service Science is a new term for a new paradigm which aims at the solution of an obvious problem: How to make the increasing fusion of business and IT successful in a dynamically ...
Konrad Pfadenhauer, Burkhard Kittl, Schahram Dustd...
CAU
2004
192views Cryptology» more  CAU 2004»
14 years 11 months ago
Encrypted? Randomised? Compromised? (When Cryptographically Secured Data is Not Secure)
Protecting data is not simply a case of encrypt and forget: even data with full cryptographic confidentiality and integrity protection can still be subject to information leakage. ...
Mike Bond, Jolyon Clulow
SOCIALCOM
2010
14 years 7 months ago
A Decision Theoretic Approach to Data Leakage Prevention
Abstract--In both the commercial and defense sectors a compelling need is emerging for rapid, yet secure, dissemination of information. In this paper we address the threat of infor...
Janusz Marecki, Mudhakar Srivatsa, Pradeep Varakan...
KES
2005
Springer
15 years 3 months ago
Analysis of Conversation Quanta for Conversational Knowledge Circulation
: In this paper, we present a computational approach to understanding and augmenting the conversational knowledge process. We introduce the concept of the conversation quantization...
Ken Saito, Hidekazu Kubota, Yasuyuki Sumi, Toyoaki...
CN
2004
98views more  CN 2004»
14 years 9 months ago
On selection of candidate paths for proportional routing
QoS routing involves selection of paths for flows based on the knowledge at network nodes about the availability of resources along paths, and the QoS requirements of flows. Sever...
Srihari Nelakuditi, Zhi-Li Zhang, David Hung-Chang...