Sciweavers

1829 search results - page 342 / 366
» aims 2008
Sort
View
HICSS
2008
IEEE
114views Biometrics» more  HICSS 2008»
15 years 3 months ago
Leveraging the Wisdom of Crowds: Designing an IT-Supported Ideas Competition for an ERP Software Company
“Crowdsourcing” is currently one of the most discussed key words within the open innovation community. The major question for both research and business is how to find and lev...
Winfried Ebner, Jan Marco Leimeister, Ulrich Brets...
80
Voted
HICSS
2008
IEEE
137views Biometrics» more  HICSS 2008»
15 years 3 months ago
The Futures of EU-Based eGovernment: A Scenario-Based Exploration
The future of eGovernment is very uncertain and requires to be approached by depicting different scenario in which a wide range of contextual factors, such as social, cultural, in...
Patrick van der Duin, Noor Huijboom
HOST
2008
IEEE
15 years 3 months ago
Place-and-Route Impact on the Security of DPL Designs in FPGAs
—Straightforward implementations of cryptographic algorithms are known to be vulnerable to attacks aimed not at the mathematical structure of the cipher but rather at the weak po...
Sylvain Guilley, Sumanta Chaudhuri, Jean-Luc Dange...
ICASSP
2008
IEEE
15 years 3 months ago
An information theoretic approach to processing management
In region surveillance applications, sensors oftentimes accumulate an overwhelmingly large amount of data, making it infeasible to process all of the collected data in real-time. ...
Christopher M. Kreucher, Kevin M. Carter
ICASSP
2008
IEEE
15 years 3 months ago
Image processing by topological asymptotic analysis
The aim of this article is to recall the applications of the topological asymptotic expansion to many image processing problems. We briefly review the topological asymptotic analy...
Didier Auroux, Mohamed Masmoudi