Sciweavers

2454 search results - page 424 / 491
» Privacy in the Information and Communications Technologies
Sort
View
CHIMIT
2007
ACM
15 years 1 months ago
Network-centricity: hindered by hierarchical anchors
Network-centricity is a concept under consideration as a useful paradigm for complex organizational operations, combining the strengths of bureaucracy with the innovative possibil...
Steve Abrams, Gloria Mark
CAISE
2006
Springer
15 years 1 months ago
Loosely-Coupled Process Automation in Medical Environments
Abstract. We discuss a case study for the hospital scenario where workflow model components are distributed across various computers or devices (e.g. mobile phones, PDAs, sensors, ...
Jurate Vysniauskaite
CTRSA
2008
Springer
150views Cryptology» more  CTRSA 2008»
14 years 11 months ago
Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY1
Abstract. Camellia and MISTY1 are Feistel block ciphers. In this paper, we observe that, when conducting impossible differential cryptanalysis on Camellia and MISTY1, their round s...
Jiqiang Lu, Jongsung Kim, Nathan Keller, Orr Dunke...
IMC
2007
ACM
14 years 11 months ago
Learning network structure from passive measurements
The ability to discover network organization, whether in the form of explicit topology reconstruction or as embeddings that approximate topological distance, is a valuable tool. T...
Brian Eriksson, Paul Barford, Robert Nowak, Mark C...
CISS
2011
IEEE
14 years 1 months ago
Characterizing multiplexing and diversity in visual MIMO
—Mobile optical wireless has so far been limited to very short ranges for high data rate systems. It may be feasible to overcome the data rate limitations over large transmission...
Ashwin Ashok, Marco Gruteser, Narayan B. Mandayam,...