Sciweavers

1144 search results - page 166 / 229
» Protocol Implementation in a Vertically Structured Operating...
Sort
View
HICSS
2002
IEEE
154views Biometrics» more  HICSS 2002»
15 years 2 months ago
Designing Effective Incentive-Oriented Outsourcing Contracts for ERP Systems
Information systems outsourcing has been viewed as an attractive option by many senior managers generally because of the belief that IS outsourcing vendors can achieve economies o...
Kweku-Muata Bryson, William E. Sullivan
BMCBI
2008
124views more  BMCBI 2008»
14 years 9 months ago
RPPAML/RIMS: A metadata format and an information management system for reverse phase protein arrays
Background: Reverse Phase Protein Arrays (RPPA) are convenient assay platforms to investigate the presence of biomarkers in tissue lysates. As with other high-throughput technolog...
Romesh Stanislaus, Mark Carey, Helena F. Deus, Kev...
PODC
2003
ACM
15 years 2 months ago
Scalable public-key tracing and revoking
Traitor Tracing Schemes constitute a very useful tool against piracy in the context of digital content broadcast. In such multi-recipient encryption schemes, each decryption key is...
Yevgeniy Dodis, Nelly Fazio, Aggelos Kiayias, Moti...
JAVA
2000
Springer
15 years 1 months ago
A portable sampling-based profiler for Java virtual machines
This paper describes a portable and efficient sampling-based online measurement system for production-level Java virtual machines. This system is designed to provide continuous re...
John Whaley
SAC
2008
ACM
14 years 9 months ago
Offline count-limited certificates
In this paper, we present the idea of offline count-limited certificates (or clics for short), and show how these can be implemented using minimal trusted hardware functionality a...
Luis F. G. Sarmenta, Marten van Dijk, Jonathan Rho...