Sciweavers

7225 search results - page 25 / 1445
» Software is data too
Sort
View
SP
1999
IEEE
155views Security Privacy» more  SP 1999»
15 years 4 months ago
Software Smart Cards via Cryptographic Camouflage
A sensitive point in public key cryptography is how to protect the private key. We outline a method of protecting private keys using cryptographic camouflage. Specifically, we do ...
Douglas N. Hoover, B. N. Kausik
MISQ
2000
123views more  MISQ 2000»
14 years 11 months ago
A Cross-Cultural Study on Escalation of Commitment Behavior in Software Projects
One of the most challenging decisions that a manager must confront is whether to continue or abandon a troubled project. Published studies suggest that failing software projects a...
Mark Keil, Bernard C. Y. Tan, Kwok Kee Wei, Timo S...
CIKM
2009
Springer
15 years 6 months ago
A case study on model driven data integration for data centric software development
Model Driven Data Integration is a data integration approach that proactively incorporates and utilizes metadata across the data integration process. By decoupling data and metada...
Hyeonsook Kim, Ying Zhang, Samia Oussena, Tony Cla...
LREC
2010
132views Education» more  LREC 2010»
15 years 1 months ago
Technical Infrastructure at Linguistic Data Consortium: Software and Hardware Resources for Linguistic Data Creation
Linguistic Data Consortium (LDC) at the University of Pennsylvania has participated as a data provider in a variety of governmentsponsored programs that support development of Hum...
Kazuaki Maeda, Haejoong Lee, Stephen Grimes, Jonat...