Sciweavers

11862 search results - page 302 / 2373
» Relative information completeness
Sort
View
HICSS
1998
IEEE
108views Biometrics» more  HICSS 1998»
15 years 9 months ago
Workflow Optimization through Task Redesign in Business Information Processes
The academic and professional literature addressing business process reengineering points at inter-task information flow delays (handoffs) as a major source of processing errors a...
Rajiv M. Dewan, Abraham Seidmann, Zhiping D. Walte...
147
Voted
CORR
2010
Springer
114views Education» more  CORR 2010»
15 years 5 months ago
Secure Lossy Source Coding with Side Information at the Decoders
This paper investigates the problem of secure lossy source coding in the presence of an eavesdropper with arbitrary correlated side informations at the legitimate decoder (referre...
Joffrey Villard, Pablo Piantanida
DAC
2005
ACM
16 years 5 months ago
Simulation models for side-channel information leaks
Small, embedded integrated circuits (ICs) such as smart cards are vulnerable to so-called side-channel attacks (SCAs). The attacker can gain information by monitoring the power co...
Kris Tiri, Ingrid Verbauwhede
DEBS
2009
ACM
15 years 11 months ago
PrivateFlow: decentralised information flow control in event based middleware
Complex middleware frameworks are made out of interacting components which may include bugs. These frameworks are often extended to provide additional features by thirdparty exten...
Ioannis Papagiannis, Matteo Migliavacca, Peter R. ...
HICSS
2008
IEEE
168views Biometrics» more  HICSS 2008»
15 years 11 months ago
Current Practices in Field Force Automation: Decision Support and Information Management for the Field Force
In the past, field operations have mostly been a stepchild of information and communication technology (ICT) enabled organizational overhaul and process re-design. Recently, incre...
Gwen Trentham, Hans Jochen Scholl