Sciweavers

1347 search results - page 191 / 270
» Towards a Secure Data Stream Management System
Sort
View
140
Voted
ICIS
2003
15 years 6 months ago
The Antecedents of Information Systems Development Capability in Firms: A Knowledge Integration Perspective
ThelinkagesbetweenISandbusinessunitsarerecognizedasbeingcriticaltoinformationsystemsdevelopment processes and outcomes. Previous research has found that they are associated with b...
Amrit Tiwana, Anandhi S. Bharadwaj, V. Sambamurthy
SOUPS
2009
ACM
15 years 11 months ago
Look into my eyes!: can you guess my password?
Authentication systems for public terminals – and thus public spaces – have to be fast, easy and secure. Security is of utmost importance since the public setting allows manif...
Alexander De Luca, Martin Denzel, Heinrich Hussman...
JUCS
2010
162views more  JUCS 2010»
15 years 3 months ago
Enabling Personal Privacy for Pervasive Computing Environments
: Protection of personal data in the Internet is already a challenge today. Users have to actively look up privacy policies of websites and decide whether they can live with the te...
Susana Alcalde Bagüés, Andreas Zeidler...
ACSAC
2002
IEEE
15 years 10 months ago
Composable Tools For Network Discovery and Security Analysis
Security analysis should take advantage of a reliable knowledge base that contains semantically-rich information about a protected network. This knowledge is provided by network m...
Giovanni Vigna, Fredrik Valeur, Jingyu Zhou, Richa...
PERVASIVE
2007
Springer
15 years 4 months ago
Mobiscopes for Human Spaces
The proliferation of affordable mobile devices with processing and sensing capabilities, together with the rapid growth in ubiquitous network connectivity, herald an era of Mobisc...
Tarek F. Abdelzaher, Yaw Anokwa, Péter Boda...