Sciweavers

20 search results - page 3 / 4
» Multiattribute electronic procurement using goal programming
Sort
View
ISSA
2004
13 years 7 months ago
A General Methodology For The Development Of An Effective Information Security Policy
In today's hi-tech world, conventional physical security methods are simply insufficient for the protection of an organisation's information assets. This is because of t...
Arvish Ramdeyal
ENGL
2008
100views more  ENGL 2008»
13 years 6 months ago
HIDE+: A Logic Based Hardware Development Environment
With the advent of System-On-Chip (SOC) technology, there is a pressing need to enhance the quality of ools available and increase the level of abstraction at which hardware is des...
Abdsamad Benkrid, Khaled Benkrid
HICSS
2003
IEEE
120views Biometrics» more  HICSS 2003»
13 years 11 months ago
A Primitive Study of Logrolling in e-Negotiation
e-Negotiation involves two or more agents multilaterally bargaining for mutual gain, using information technologies in a cooperative problem-solving (CPS) environment. This paper ...
Patrick C. K. Hung
DAC
2008
ACM
13 years 8 months ago
Protecting bus-based hardware IP by secret sharing
Our work addresses protection of hardware IP at the mask level with the goal of preventing unauthorized manufacturing. The proposed protocol based on chip locking and activation i...
Jarrod A. Roy, Farinaz Koushanfar, Igor L. Markov
VRML
1999
ACM
13 years 10 months ago
Staging the Space of Mixed Reality - Reconsidering the Concept of a Multi User Environment
This paper presents our work and research findings on developing the concept of a multi-user shared environment for culture, performance, art and entertainment. It introduces arti...
Wolfgang Strauss, Monika Fleischmann, Mette Thomse...