Sciweavers

159 search results - page 16 / 32
» The Pros and Cons of Netcharts
Sort
View
ICIS
1998
15 years 1 months ago
Adopting SAP at Siemens Power Corporation
This case describes how Siemens Power Corporation, a Richland, Washington (USA), based manufacturer of nuclear fuel assemblies, came to adopt and implement SAP's R/3 applicat...
Sabine Gabriele Hirt, E. Burton Swanson
65
Voted
BIB
2008
75views more  BIB 2008»
14 years 12 months ago
Gene-set approach for expression pattern analysis
Recently developed gene set analysis methods evaluate differential expression patterns of gene groups instead of those of individual genes. This approach especially targets gene g...
Dougu Nam, Seon-Young Kim
CORR
2010
Springer
212views Education» more  CORR 2010»
14 years 11 months ago
Cryptanalysis of a more efficient and secure dynamic id-based remote user authentication scheme
In 2004, Das, Saxena and Gulati proposed a dynamic ID-based remote user authentication scheme which has many advantage such as no verifier table, user freedom to choose and change...
Mohammed Aijaz Ahmed, D. Rajya Lakshmi, Sayed Abdu...
ADT
2006
14 years 11 months ago
Data Confidentiality: to which extent cryptography and secured hardware can help
Data confidentiality has become a major concern for individuals as well as for companies and administrations. In a classical client-server setting, the access control management is...
Nicolas Anciaux, Luc Bouganim, Philippe Pucheral
NETWORK
2008
68views more  NETWORK 2008»
14 years 11 months ago
A retrospective view of network address translation
Today, network address translators, or NATs, are everywhere. Their ubiquitous adoption was not promoted by design or planning but by the continued growth of the Internet, which pl...
Lixia Zhang