Sciweavers

1940 search results - page 39 / 388
» Process as Theory in Information Systems Research
Sort
View
SIGADA
2004
Springer
15 years 7 months ago
Information systems security engineering: a critical component of the systems engineering lifecycle
The purpose of this research paper is to illustrate the industrial and federal need for Information Systems Security Engineering (ISSE) in order to build Information Assurance (IA...
James F. Davis
IJON
2007
88views more  IJON 2007»
15 years 1 months ago
Information maximization in face processing
This perspective paper explores principles of unsupervised learning and how they relate to face recognition. Dependency coding and information maximization appear to be central pr...
Marian Stewart Bartlett
ATAL
2005
Springer
15 years 7 months ago
A multiagent system manages collaboration in emergent processes
Emergent processes are non-routine, collaborative business processes whose execution is guided by the knowledge that emerges during a process instance. In so far as the process go...
John K. Debenham
125
Voted
EIT
2008
IEEE
15 years 3 months ago
Experiments in attacking FPGA-based embedded systems using differential power analysis
Abstract--In the decade since the concept was publicly introduced, power analysis attacks on cryptographic systems have become an increasingly studied topic in the computer securit...
Song Sun, Zijun Yan, Joseph Zambreno
150
Voted
ESWA
2006
122views more  ESWA 2006»
15 years 1 months ago
Ontology construction for information classification
Following the advent of the Internet technology and the rapid growth of its applications, users have spent long periods of time browsing through the ocean of information found in ...
Sung-Shun Weng, Hsine-Jen Tsai, Shang-Chia Liu, Ch...